Skip to content

Identifying filters

Filter/WAF Detection

  • If we try our payload and see an error on the same page means that the application has filters in place
    • if we saw another page with a REQUEST-ID, we can say that the WAF blocked it.
  • BREAKDOWN
  • Payload: 127.0.0.1; whoami
    • the filter either detected a blacklisted character or a command or both

Blacklisted Characters

  • eg code:
  • if any char in our input string matches, our request is denied.
  • we can use <<< instead of |

Before we start the attempts to bypass a filter, we should try to find the character that is being filtered.

Identifying the Blacklisted character

  • Reduce the string to find where the error starts.