Published in


WAF: Web Application Firewalls — How do they even work?


What you need to know about WAF evasion techniques before we start is that this is a topic that is VERY hard to describe properly. WAFs are super diverse and research into them is sparse. All of this is because a WAF can be configured just like any networking component. The configuration can differ from target to target and this is a real challenge. We will first explore how WAFs work so we can design a proper attack technique. You need to know your enemy before you can fight it.




Everything connected with Tech & Code. Follow to join our 900K+ monthly readers

Recommended from Medium

5 easy-to-setup CyberSecurity best practices for startups

My Bucket’s Got a Hole in it — Cloud Storage vs Security

A Love-Hate Relationship With The Internet

Work on captcha recognition ★ Review and Guide

How to send data from your phone to a computer.

Ping IM Messenger for iOS & Android Takes Private & Secure Messaging On a New Level

Algorithm to Calculate or Find Worth of the Website or Monthly Website Visitors

Is Your Home Security System Protecting You

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


No b*llshit Hacking tutorials with extreme value in short bursts

More from Medium

How “Docker” can help you become a better hacker

How to hunt for bug bounties

Top 25 Subdomain Takeover Bug Bounty Reports

Just 7 Days Left for IWCON2022. Have You Registered Yet?