WAF & Rate Limiting
Overview
Web Application Firewalls (WAF) and rate limiting protect your application from malicious traffic. However, these protections can prevent Pensar from comprehensively testing your application for real vulnerabilities.
For Best Results: Allowlist Pensar’s testing infrastructure or temporarily disable WAF and rate limiting during penetration tests.
Why This Matters
Pensar’s automated security testing triggers defensive mechanisms, preventing accurate vulnerability assessment:
WAFs block legitimate security test payloads (SQL injection, XSS, path traversal) before they reach your application, hiding real vulnerabilities.
Rate limits stop testing mid-scan, causing incomplete coverage and missed vulnerabilities in untested endpoints.
Testing your actual application code reveals real vulnerabilities in your business logic, not just WAF effectiveness.
Understand your application’s native security without relying solely on external protections.
What Gets Blocked
Without proper configuration, you may experience:
- Blocked Test Payloads: SQL injection, XSS, and command injection tests blocked by WAF rules
- Incomplete Scans: Rate limiting stops endpoint discovery and fuzzing before completion
- Bot Detection: CAPTCHA challenges and JavaScript validation block automated testing
- Throttled Requests: Authentication testing and concurrent requests trigger rate limits
- Missed Vulnerabilities: Protections prevent Pensar from fully testing your attack surface
Pensar Production IP Addresses
All Pensar penetration testing traffic originates from our AWS infrastructure with static IPs. Allowlist these IPs in your WAF and rate limiting configuration:
Production IPs to Allowlist:
Add both IPs to your WAF allowlist and rate limiter exceptions.
Recommended Approach
Allowlist Pensar IPs
Add Pensar’s production IPs to your WAF and rate limiter allowlist. This maintains protection against actual threats while allowing comprehensive testing.
Test Staging First
Run initial tests against staging/development environments where protections can be safely disabled.
Common WAF Providers
Refer to your WAF provider’s documentation for allowlisting IPs:
- Cloudflare: Create firewall rule to skip WAF for Pensar IPs
- AWS WAF: Create IP set with Pensar IPs and add allow rule with priority 0
- Google Cloud Armor: Add allow rule for Pensar IPs with highest priority
- Azure Front Door: Add custom rule to allow Pensar IPs
- Other Providers: Add Pensar IPs to allowlist/whitelist with highest priority
Most providers support IP allowlisting that bypasses all WAF rules and rate limits for specified IPs.
After Configuration
Once configured, you should see:
- ✅ Pensar traffic allowed through WAF without blocking
- ✅ No rate limiting on Pensar requests
- ✅ Complete test coverage of all endpoints
- ✅ Accurate vulnerability findings
- ✅ Comprehensive security assessment
If tests are still being blocked, check your WAF logs and verify the allowlist rule has highest priority.
Need Help? Contact team@pensarai.com for assistance with WAF configuration or if you need updated IP addresses.
Next Steps
Add domains to your project for penetration testing.
Configure authentication credentials for testing protected endpoints.
Start automated penetration testing on your domains.
Learn how Pensar discovers and maps your application’s attack surface.