Created
November 8, 2018 07:33
-
-
Save christophlehmann/df3b7527602b7173a12c97ea8c67a03a to your computer and use it in GitHub Desktop.
Apache log fail2ban sql injection scanner
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[Definition] | |
failregex = ^<HOST> .*UNION%%20SELECT%%20CHAR.*HTTP | |
^<HOST> .*select\*from.*HTTP | |
^<HOST> .*select%%20name_const.*HTTP | |
# Dev notes | |
# | |
# % must be escaped with '%' |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[sql-scanner] | |
enabled = true | |
port = http,https | |
maxretry = 2 | |
bantime = 3600 | |
logpath = /home/*/logs/access.log | |
action = %(action_mwl)s |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Hi, thanks for the example. Please let me improve it a bit:
select\*from
should beselect.*from
(?i)
prefix (documentation)ignoreregex =
string, otherwise plesk doesn't show the filter when you add a jail (I've spent like an hour to find it out).So in my case, to use it with Plesk, the filter looks like this: