🦞🌯 Lobster Roll

Thread

Bypassing MaxScale's Firewall and Masking Rules (blog.tarq.io)

Stories related to "Bypassing MaxScale's Firewall and Masking Rules" across the full archive.

Bypassing MaxScale's Firewall and Masking Rules (blog.tarq.io)
TP-Link C2 and C20i vulnerable to command injection, DoS, improper firewall rules (pierrekim.github.io)
CacheBrowser: Bypassing Chinese Firewall Without Proxies (infatica.io)
I just learned: Docker edits firewall rules for you (geoff.tuxpup.com)
Firewall rules: not as secure as you think (haskellforall.com)
Firewall rules: not as secure as you think (haskellforall.com)
Firewall rules: not as secure as you think (haskellforall.com)
Whalewall: Automate management of firewall rules for Docker containers (github.com)
Burning Data with Malicious Firewall Rules in Azure SQL Server (varonis.com)
Burning Data with Malicious Firewall Rules in Azure SQL Server (varonis.com)
Burning Data with Malicious Firewall Rules in Azure SQL Server (varonis.com)
Bypassing a web application firewall with autocomplete (jessie.cafe)
Bypassing a web application firewall with autocomplete (jessie.cafe)
Show HN: I made cc-filter after Claude kept bypassing its own rules (github.com)
Been using Claude Code for a few months and realized it can bypass its own permission system pretty easily. Even with deny config or CLAUDE.md rules, it finds ways to read .env or similar files through alternative paths or indirect commands. There are several open issues in the Claude Code repo abou...