Skip to content

Verifying Attacks

Wallarm automatically rechecks attacks for active vulnerability detection.

You can check the attack verification status and force an attack recheck on the Attacks tab. Selected attack will be the basis for the test attack set generation.

Attacks with various verification statuses

Check the attack verification status

  1. Click the Attacks tab.

  2. Check the status in the Active verification column.

Attack verification status legend

  • Verified Verified: The attack has been verified.

  • Error Error: An attempt to verify an attack type that does not support verification. Possible reasons

  • Skipped Skipped: An attempt to verify an attack type has been skipped. Possible reasons

  • Forced Forced: The attack has a raised priority in the verification queue.

  • Sheduled Scheduled: The attack is queued for verification.

  • Could not connect Could not connect to the server: It is not possible to access the server at this time.

Forcing attack verification

  1. Select an attack.

  2. Click the status sign in the Active verification column.

  3. Click Force verification.

Wallarm will raise the priority of the attack verification in the queue.

Attacks verification

Attack types that do not support verification

Attacks of the following types do not support verification:

Attack re-check will fail in the following cases:

  • Attacks sent via the gRPC or Protobuff protocol

  • Attacks sent via the HTTP protocol of the version different from 1.x

  • Attacks sent via the method different from one of the following: GET, POST, PUT, HEAD, PATCH, OPTIONS, DELETE, LOCK, UNLOCK, MOVE, TRACE

  • Failed to reach an address of an original request

  • Attack signs are in the HOST header

  • Request element containing attack signs is different from one of the following: uri , header, query, post, path, action_name, action_ext