• Register now to get access to thousands of Tutorials, Leaked content, Hot NSFW and much more. Join us as we build and grow the community.

Advertise Here

Advertise Here

Advertise Here

nowafpls Burp plugin bypasses WAF by inserting junk data

musse2202

Satirical Mastermind
M Rep
0
0
0
Rep
0
M Vouches
0
0
0
Vouches
0
Posts
107
Likes
199
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 300 XP
Link:
"
You must upgrade your account or reply in the thread to view the hidden content.
"
[Paste your content here. Remove this line and one below!]
[DO NOT PASTE THE CONTENT ABOVE OR BELOW THE REPLY QUOTES]
Most web application firewalls (WAFs) have limits on the amount of data they can process when sending a request body.This means that for HTTP requests that include a request body (i.e. POST, PUT, PATCH, etc.),Often a WAF can be bypassed simply by prepending junk data to the request body.
When the request is filled with this garbage data, the WAF will process the request up to X kb and analyze it, but everything after the WAF limit will just pass through.
nowafpls is a simple Burp plugin that will insert this junk data into the HTTP request inside the repeater tab. You can choose from a preset number of junk data or insert any amount of junk data by selecting the "Custom" option.
Install nowafpls
nowafpls is a Jython-based Burp plugin.
  • Clone or download this repo.
  • Go to the Extensions tab in Burp Suite.
  • Click "Add"
  • Select Extension Type – Python
  • Select the "nowafpls.py" you downloaded in step 1
How to use nowafpls
  • Send any requests that you want to bypass the WAF to the Repeater tab.
  • Place the cursor where you want to insert the junk data.
  • Right click -> Extensions -> nowafpls
  • Choose how much garbage data to insert
  • Click "OK"
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

452,499

350,639

350,649

Top