Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Command Injection in F5 iRules

Black Hat via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore command injection vulnerabilities in F5 iRules through this 49-minute Black Hat conference talk. Dive into the world of BigIP F5 products, widely used by large corporations and governments for reverse proxy and web traffic routing. Learn about iRules, a subset of rules written in TCL-based language, and understand its syntax, structure, and potential security risks. Examine script examples, server headers, and HTTP server configurations. Discover exploitation techniques, including table syntax manipulation and TMSH attack chains. Gain insights into unit testing for iRules and understand the importance of secure coding practices in high-performance network environments. Conclude with a summary of key takeaways and participate in a Q&A session to deepen your understanding of iRules security.

Syllabus

Introduction
Christopher
What is iRules
iRules the language
Script example
Server header
HTTP server
Syntax
Decalogue
Quotes
Code Example
Exploit
Demo
Table and Table
Table Syntax
Example
Request
TMSH
Attack Chain
Unit Testing
Summary
Questions

Taught by

Black Hat

Reviews

Start your review of Command Injection in F5 iRules

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.