Many a times, the WAF varies the Server header upon different types of interactions.Make GET requests with outdated protocols like HTTP/0.9 ( HTTP/0.9 does not support POST type queries).Append some catchy keywords like ' OR SLEEP(5) OR ' at end of URLs to any random parameter././etc/passwd to a random parameter at end of URL. If there is some input field somewhere, try with noisy payloads like alert().If there is a login page somewhere, try some common (easily detectable) payloads like " or 1 = 1.Make GET requests to random open ports and grab banners which might expose the WAFs identity. cURL), and test response content and headers (no user-agent included).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |