F5 Distributed Cloud > F5 Distributed Cloud: Advanced Threat & Fraud Security Source | Edit on
Lab 2: Adding a Bot Protection Profile and Testing¶
Scenario Lab 2
In the prior lab we discovered our airline application lacked proper security protections and was vulnerable. The following lab tasks will strengthen our security posture and address the increase in Bot activity towards your company’s airline application. We will leverage our Bot testing tool to validate our Bot protection policies and utilize security analytics to examine various requests.
Expected Lab Time: 30 minutes
Task 1: Create a Bot Protection Profile¶
In this task you will view recent requests and filter out specific requests from our test tool. You will then work on configuring a Bot Defense profile to protect our airline application Sign-In page. We will initiate a Basic Credential Stuffing attack and observe related events using security analytics and making any necessary adjustments needed.
|
Scroll to the bottom and click on your HTTP Load Balancer |
|
Here is what the filter should end up looking like when correctly created |
As you examine these POST requests can you see what endpoint is being targeted ? |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Task 2: Compare requests with and without Bot Defense¶
For this task you will inspect the airline applications signin page all while attempting various failed login attempts. We will learn the telemetry gleaned from this scoping exercise. Please ensure these tasks are run from the Jump Host
|
|
|
End of Lab 2: This concludes Lab 2, feel free to review and test the configuration. |