From 4bb21ba6b907124d36380dd5c183fd80de0ea70f Mon Sep 17 00:00:00 2001 From: 0xInfection Date: Wed, 27 Feb 2019 13:28:29 +0530 Subject: [PATCH] Added more bypass techniques --- README.md | 92 ++++++++++++++++++++++++++++++++++++++++--------------- 1 file changed, 67 insertions(+), 25 deletions(-) diff --git a/README.md b/README.md index 3e3c08a..c85fb9e 100644 --- a/README.md +++ b/README.md @@ -58,15 +58,18 @@ Feel free to [contribute](CONTRIBUTING.md). - Other WAFs reply with unusual response codes upon malicious requests (eg. WebKnight, 360 WAF). ### Detection Techniques: +To identify WAFs, we need to (dummy) provoke it. 1. Make a normal GET request from a browser, intercept and test response headers (specifically cookies). 2. Make a request from command line (eg. cURL), and test response content and headers (no user-agent included). -3. If there is a login page somewhere, try some common (easily detectable) payloads like `' or 1 = 1 --`. +3. If there is a login page somewhere, try some common (easily detectable) payloads like `" or 1 = 1 --`. 4. If there is some input field somewhere, try with noisy payloads like ``. -5. Make GET requests with outdated protocols like `HTTP/0.9` (`HTTP/0.9` does not support POST type queries). -6. Many a times, the WAF varies the `Server` header upon different types of interactions. -7. Drop Action Technique - Send a raw crafted FIN/RST packet to server and identify response. +5. Attach a dummy `../../../etc/passwd` to a random parameter at end of URL. +6. Append some catchy keywords like `' OR SLEEP(5) OR '` at end of URLs to any random parameter. +6. Make GET requests with outdated protocols like `HTTP/0.9` (`HTTP/0.9` does not support POST type queries). +7. Many a times, the WAF varies the `Server` header upon different types of interactions. +8. Drop Action Technique - Send a raw crafted FIN/RST packet to server and identify response. > __Tip:__ This method could be easily achieved with tools like [HPing3](http://www.hping.org) or [Scapy](https://scapy.net). -8. Side Channel Attacks - Examine the timing behaviour of the request and response content. +9. Side Channel Attacks - Examine the timing behaviour of the request and response content. ## WAF Fingerprints Wanna detect WAFs? Lets see how. @@ -84,7 +87,11 @@ Wanna detect WAFs? Lets see how. @@ -638,6 +645,7 @@ Wanna detect WAFs? Lets see how.