The tweet mentions hunting bugs using error-based SQL injection (SQLi) to bypass a Web Application Firewall (WAF) without automation. The tweet highlights the use of payloads and manual techniques like coffee, patience, and payloads. The bypass used in this case is error-based SQLi. No specific WAF vendor is mentioned in the tweet. It showcases a traditional approach to finding vulnerabilities in web applications and bypassing security measures. This emphasizes the importance of manual testing and understanding the underlying vulnerabilities in the application. The tweet encourages a hands-on and methodical approach to bug hunting.
Hunting bugs the old-school way: Error-based SQLi, WAF bypass, no automation.
Just coffee, patience, and payloads hhhhhh https://t.co/Fam4GH1rge
— Yassir Wahid (@yassir_wahid) November 21, 2024