From 4bb21ba6b907124d36380dd5c183fd80de0ea70f Mon Sep 17 00:00:00 2001
From: 0xInfection
Date: Wed, 27 Feb 2019 13:28:29 +0530
Subject: [PATCH] Added more bypass techniques
---
README.md | 92 ++++++++++++++++++++++++++++++++++++++++---------------
1 file changed, 67 insertions(+), 25 deletions(-)
diff --git a/README.md b/README.md
index 3e3c08a..c85fb9e 100644
--- a/README.md
+++ b/README.md
@@ -58,15 +58,18 @@ Feel free to [contribute](CONTRIBUTING.md).
- Other WAFs reply with unusual response codes upon malicious requests (eg. WebKnight, 360 WAF).
### Detection Techniques:
+To identify WAFs, we need to (dummy) provoke it.
1. Make a normal GET request from a browser, intercept and test response headers (specifically cookies).
2. Make a request from command line (eg. cURL), and test response content and headers (no user-agent included).
-3. If there is a login page somewhere, try some common (easily detectable) payloads like `' or 1 = 1 --`.
+3. If there is a login page somewhere, try some common (easily detectable) payloads like `" or 1 = 1 --`.
4. If there is some input field somewhere, try with noisy payloads like ``.
-5. Make GET requests with outdated protocols like `HTTP/0.9` (`HTTP/0.9` does not support POST type queries).
-6. Many a times, the WAF varies the `Server` header upon different types of interactions.
-7. Drop Action Technique - Send a raw crafted FIN/RST packet to server and identify response.
+5. Attach a dummy `../../../etc/passwd` to a random parameter at end of URL.
+6. Append some catchy keywords like `' OR SLEEP(5) OR '` at end of URLs to any random parameter.
+6. Make GET requests with outdated protocols like `HTTP/0.9` (`HTTP/0.9` does not support POST type queries).
+7. Many a times, the WAF varies the `Server` header upon different types of interactions.
+8. Drop Action Technique - Send a raw crafted FIN/RST packet to server and identify response.
> __Tip:__ This method could be easily achieved with tools like [HPing3](http://www.hping.org) or [Scapy](https://scapy.net).
-8. Side Channel Attacks - Examine the timing behaviour of the request and response content.
+9. Side Channel Attacks - Examine the timing behaviour of the request and response content.
## WAF Fingerprints
Wanna detect WAFs? Lets see how.
@@ -84,7 +87,11 @@ Wanna detect WAFs? Lets see how.
Returns status code 493 upon unusual requests.
On viewing source-code of error page, you will find reference to wzws-waf-cgi/ directory.
-
Source code may contain reference to wangshan.360.cn URL.
+
Blocked response page source may contain:
+
+
Reference to wangshan.360.cn URL.
+
Sorry! Your access has been intercepted text snippet.
A potentially unsafe operation has been detected in your request to this site text warning.
+
Your access to this site has been limited text warning.
+
This response was generated by Wordfence text snippet.
+
+
+
+
+
WP Cerber Firewall
@@ -1658,8 +1687,11 @@ __9. String Concatenation__
- Different programming languages have different syntaxes and patterns for concatenation.
- This allows us to effectively generate payloads that can bypass many filters and rules.
+__Standard__: `