The tweet discusses a scenario where a WAF (Web Application Firewall) detects bypass attempts by analyzing tags. The user asks how to bypass this detection mechanism. The exact WAF vendor is not mentioned, nor is a specific payload provided. The post implies that current WAFs can detect malicious inputs when they involve certain HTML tags or similar markers, but the user seeks techniques to evade this detection. Given the information, a detailed blog post can discuss the general approach to bypass WAF tag detection mechanisms, including using alternative encodings, obfuscation, and other evasion techniques. Without specific payloads or vendor details, recommendations will remain generic.
Original tweet: https://twitter.com/GnutTlam/status/1938743791734952336
Subscribe for the latest news: