Installation and Configuration
Required additional libraries and files
Integrating ModSecurity with Apache
An introduction to regular expressions
Actions—what to do when a rule matches
Using the ctl action to control the rule engine
Audit log sanitization actions
From vulnerability discovery to virtual patch: An example
Shell command execution attempts
Detecting the real IP address of an attacker
How ModSecurity helps jailing Apache
Using ModSecurity to create a chroot jail
Considerations before beginning
Step 1: Identifying user actions
Step 2: Getting detailed information on each action
Step 4: Testing the new ruleset
Blocking what's allowed—denying everything else