Welcome to World of IPTV

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

Forum Rules

Our Rules: Read to avoid getting banned!

Advertising

Introduce Yourself to the World with Us!

Resource Database

Find the newest resources around IPTV!

Account upgrade

Upgrade your account to unlock more benefits!

Info Block MAG Scanning Using Cloudflare

alqui82

Basic Member
Basic Member
Joined
Mar 1, 2021
Messages
101
Reaction score
34
Points
39
Location
World
For those that are using Cloudflare WAF, you can block MAG scanning easily by adding custom rule query string
?type=stb&action=handshake&token=&prehash=0&JsHttpRequest=1-xml
 
did you try it ? it works without making issues for legal devices ?
 
did you try it ? it works without making issues for legal devices ?
I do implement this over 1 year of course it does work, this is not a legimate request.
If attacker change slightly the command you can always check it at even viewer of cloudflare as well.
 
Channels MatchTime Unblock CDN Offshore Server Contact
100 cnx / 90€ 5Gbps / 180€ 48CPU-256GRAM 10Gbps 569€ Skype live:giefsl
500 cnx / 350€ 10Gbps / 350€ 48CPU-128GRAM 5Gbps / 349€ TG @changcdn
1000 cnx / 500€ 20Gbps / 700€ 40CPU-128GRAM 20Gbps / €980 http://coronaserver.com
By doing this using CF-WAF you will be protected against HTTP GET Method Only.


What if the attackers's sending this request using HTTP POST Method Instead of HTTP GET Method

POST /portal.php HTTP/1.1
Host: yourdomain.tld
Content-Type: application/x-www-form-urlencoded
Content-Length: [length]

type=stb&action=handshake&token=&prehash=0&JsHttpRequest=1-xml

using this simple HTTP POST Request You will 100% bypass CF-WAF .

PS: If you are really looking for a solution you need to monitor your traffic manually.
 
By doing this using CF-WAF you will be protected against HTTP GET Method Only.


What if the attackers's sending this request using HTTP POST Method Instead of HTTP GET Method

POST /portal.php HTTP/1.1
Host: yourdomain.tld
Content-Type: application/x-www-form-urlencoded
Content-Length: [length]

type=stb&action=handshake&token=&prehash=0&JsHttpRequest=1-xml

using this simple HTTP POST Request You will 100% bypass CF-WAF .

PS: If you are really looking for a solution you need to monitor your traffic manually.

I do monitor that why I have a proxy (firewall) middleware between cloudflare and my main.

A genius in a previous thread when i did mention it could not understand it :)
 
Last edited:
shape1
shape2
shape3
shape4
shape5
shape6
Back
Top