diff --git a/network-services-pentesting/pentesting-web/waf-bypass.md b/network-services-pentesting/pentesting-web/waf-bypass.md index f8e42e81..f5c7242b 100644 --- a/network-services-pentesting/pentesting-web/waf-bypass.md +++ b/network-services-pentesting/pentesting-web/waf-bypass.md @@ -12,13 +12,36 @@ +## Regex Bypasses +Different techniques can be used to bypass the regex filters on the firewalls. Examples include alternating case, adding line breaks, +and encoding payloads. Resources for the various bypasses can be found at [PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/XSS%20Injection/README.md#filter-bypass-and-exotic-payloads) +and [OWASP](https://cheatsheetseries.owasp.org/cheatsheets/XSS_Filter_Evasion_Cheat_Sheet.html). The examples below were pulled from [this article](https://medium.com/@allypetitt/5-ways-i-bypassed-your-web-application-firewall-waf-43852a43a1c2). + ```bash -# IIS, ASP Clasic -<%s%cr%u0131pt> == #changing the case of the tag +< #prepending an additional "<" + #using backticks instead of parenetheses +java%0ascript:alert(1) #using encoded newline characters +