Web Application FireWall
Web Application FireWall is a feature of the CleanTalk Security Service for WordPress that protects the Web application from unauthorized access, even if there are critical vulnerabilities.
It allows you to protect Web applications from known and unknown attacks. The protection is transparent to all visitors and realizes accurate filtering. It supports both GET and POST methods and requests to dynamic resources. WAF checks all requests to your website and prevents possible attacks such as Xros Site Scripting (XSS), SQL-injections, uploading files from non-authorized users, PHP constructions/code, and the presence of malicious code in the downloaded files. CleanTalk Web Application FireWall for WordPress is the proactive defense against possible attacks to prevent hacks in real-time.
You can find this option in the General Settings section of the Security plugin (WordPress Admin Page —> Settings —> Security by CleanTalk —> "General Settings" tab):
Security FireWall - enable/disable part of the security service and blocks malicious activity before site pages load.
Web Application Firewall – enable/disable WAF
XSS check – enable/disable protection from Cross-site scripting attacks
SQL-injection check – enable/disable protection from SQL-injections
Check for exploits – enable/disable checking traffic for known exploits
WAF Blocker – enable/disable blocking a visitor for 24 hours after several WAF detected brute force attempts.
Run the Upload Checker module for uploaded files – enable/disable checking of all uploaded files to the WordPress media library for malicious code. If malware is found, the upload will stop.
Check plugins and themes archives before install – enable/disable checking of plugins and themes uploaded via WordPress built-in interface with heuristic and signature analysis.
Traffic Control – enable/disable analyzing the number of requests towards a website from any IP address for a certain period of time
All attacks are logged here (WordPress Admin Page —> Settings —> Security by CleanTalk —> "Firewall" tab):
You can test if XSS protection is working.
Add this string "/?spbct_test=MD5-OF-YOUR-ACCESS-KEY&spbct_test_waf=spbct_signature_test__xss" to your website address. You have to modify it for your own access key.
Example:
- Your access key is 1234.
- Calculate MD5 hash of your key here: https://www.tools4noobs.com/online_php_functions/md5/
- It would be 81dc9bdb52d04dc20036dbd8313ed055 for the "1234" key.
- Now modify the link to the XSS block screen. It will look like this:
- MyWebsite.com/?spbct_test=81dc9bdb52d04dc20036dbd8313ed055&spbct_test_waf=spbct_signature_test__xss
You will see this blocking screen:
The same is true for testing SQL-Injection protection. Use this string:
/?spbct_test=MD5-OF-YOUR-ACCESS-KEY&spbct_test_waf=spbct_signature_test__sql
You will see this blocking screen:
If you upload an infected file you will see the error:
If you haven't found the answer to your question, please, contact our support team:
It would also be interesting
- CleanTalk Security. How to use Security FireWall LogHow to Use Security FireWall Log 1. First go to your Security Dashboard. Choose "Site Security"...
- All Installation Manuals of CleanTalk Anti-Spam ServiceCleanTalk Anti-Spam Installation Guides Here you can find our plugin installation guides for popular...
- White Label Option in the Anti-Spam Plugin by CleanTalkHow to use the White Label Option in the Anti-Spam Plugin by CleanTalk The CleanTalk plugins...