WAF Challenges¶
Test your Azure WAF investigation skills! Each challenge requires you to generate specific attack traffic, analyze WAF logs, and find the answer.
Before You Begin¶
Prerequisites¶
- Lab infrastructure deployed (Setup Guide)
- WAF in Detection or Prevention mode
- Log Analytics workspace receiving WAF logs
Tools You'll Use¶
| Tool | Purpose |
|---|---|
| WAF Insights | Visual dashboard in Azure Portal |
| Log Analytics | KQL queries against WAF logs |
| WAF Triage Workbook | Visual triage (if deployed in Lab 03B) |
Challenges¶
| # | Challenge | Difficulty | Skills |
|---|---|---|---|
| 1 | Identify the Attacker | KQL, IP analysis | |
| 2 | Name the Rule | Rule ID lookup | |
| 3 | The Secret Path | URI analysis | |
| 4 | Bot Detective | User-Agent analysis | |
| 5 | The Poisoned Parameter | Parameter extraction | |
| 6 | Count the Scanners | Aggregation, dedup |
Tips¶
General Approach
- Run the challenge traffic script for the specific challenge
- Wait 10-15 minutes for logs to appear
- Use KQL queries in Log Analytics to investigate
- Submit your answer on the challenge page
Running Individual Challenges
Script: challenge-traffic.ps1