Forum Discussion
dragonflymr
Cirrostratus
Nov 06, 2015ASM and targeted form exploatation
Hi,
I am looking for real life experiences/advice related to protecting against very precise automation based form filling.
Main point here is that whole process is not violating any application...
Michael_Koyfma1
Cirrus
Nov 07, 2015I highly suggest trying version 12 and using Proactive Bot Detection in the L7 DDoS profile. There are significant improvements in v12 with respect to ability to detect headless browsers such as PhantomJS, etc.
- dragonflymrNov 09, 2015
Cirrostratus
Hi, Thanks for info, have you any info what exactly was implemented - or as I guess it's F5 secret? I am still wondering how it can stand up against targeted attack performed by really skilled persons knowing that ASM is used for protection. Piotr - Michael_Koyfma1Nov 09, 2015
Cirrus
Piotr, Yes, as you guessed, it is the F5 secret. In general, as you know, for every malicious activity, there is a countermeasure - and F5 continues to improve the countermeasures against various types of bots and automated hacking mechanisms. While nothing is guaranteed, I suggest you try out v12 and see if the new features are effective in combating the activity you're seeing. - dragonflymrNov 12, 2015
Cirrostratus
Hi, Thanks for info. Maybe you know any good links (not only F5) about identifying and blocking boots based on headless browsers? Piotr
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects