4.6. Validate WAFaaSΒΆ

Let's take a look to see if our WAFaaS is providing the protection that we are looking for.

  1. RDP back into the Ubuntu Client 18.04. (Components > Ubuntu18.04 Client > ACCESS > XRDP)

RDP into Ubuntu Client

  1. When prompted, save the RDP file to your local machine and then open it to connect.
  2. At the Ubuntu Login prompt, click on the OK button to continue.

RDP into Ubuntu Client


If the RDP session times out, refer to the User Credentials for the student user password.

  1. Open the Firefox browser
  2. Click on the Juiceshop bookmark on the browser bar

Click on Juiceshop bookmark

  1. Accept the security risk by clicking Advanced and Accept the Risk and Continue. This is due to the BIGIP using a self-signed certificate.


Now we will try the same simple SQL injection attack that we used at the beginning of this lab.

  1. Copy and Paste the following path in your browser's location bar after
  1. The browser's location bar should look like this:
  1. The SQL-Injection attack has been successfully blocked by the WAF policy attached to your inbound topology.

Let's look at the WAF logs to see where F5 Advanced WAF blocked our SQL-Injection attack.

  1. Accessing the BIG-IP, on the left side bar menu goto Security>>Event Logs>>Application>>Requests. Click on one of the log entries that has /rest/products/search.
  1. Lots of good information on this page regarding the attack. We can see that it was a SQL-Injection attack that was blocked, where it came from and even see the decoded attack.