In WAF we (should not) trust

·Quarkslab··

Introduction You just finished configuring your brand new Web Application Firewall. You are now protected from attackers, or so you think. Maybe your applications have weaknesses, but the WAF has your back... Right? Throughout this article, we will demonstrate different ways to bypass a WAF. What is a WAF and How Does it Work? Before we begin, let us review the basics of what is a WAF and how it works. A Web Application Firewall (WAF) is a specific form of application firewall that filters, moni...

Read full article →

Related Articles

Google Chrome silently installs a 4 GB AI model on your device without consent
john-doe · Hacker News · 3d ago
DNSSEC disruption affecting .de domains – Resolved
warpspin · Hacker News · 3d ago
US healthcare marketplaces shared citizenship and race data with ad tech giants
ZeidJ · Hacker News · 4d ago
Security through obscurity is not bad
mobeigi · Hacker News · 5d ago
The text mode lie: why modern TUIs are a nightmare for accessibility
SpyCoder77 · Hacker News · 5d ago