The tweet mentions a technique for bypassing WAF by testing payloads one after another. This technique is commonly used by security researchers to find WAF vulnerabilities. The approach involves iteratively testing different payloads to find one that can evade the WAF’s protection. This method is similar to how hunters search for weaknesses in a system. It showcases the importance of thorough testing and creativity in bypassing WAFs. It’s a simple yet effective way to discover potential vulnerabilities in web application firewalls.
Check out the original tweet here: