This tweet discusses completing the Farewell challenge on TryHackMe, which is a medium difficulty web Capture The Flag (CTF) exercise. The user mentions working on WAF bypass techniques, brute forcing, and exploiting Cross-site Scripting (XSS) vulnerabilities to gain admin access within the challenge. However, the tweet does not provide specific payloads, the name of the WAF vendor, or detailed technical information about the WAF bypass itself. It highlights the user's learning experience and skill development in bypassing web application firewalls and exploiting XSS as part of ethical hacking practice in a simulated environment.
Check out the original tweet here: https://twitter.com/AakashModi1750_/status/2036165270696501277