lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1936315957.555915.1581881952371@webmail.register.it> Date: Sun, 16 Feb 2020 20:39:12 +0100 (CET) From: RedTimmy Security <redazione@...fault.it> To: redazione@...fault.it Subject: Web Application Firewall bypass via Bluecoat device Hi, we have published a new post in our blog titled "How to hack a company by circumventing its WAF through the abuse of a different security appliance and win bug bounties". We basically have [ab]used a Bluecoat device behaving as a request forwarder to mask our malicious payload, avoid WAF detection, hit an HTTP endpoint vulnerable to RCE and pop out a shell. Full story is here: https://www.redtimmy.com/web-application-hacking/how-to-hack-a-company-by-circumventing-its-waf-through-the-abuse-of-a-different-security-appliance-and-win-bug-bounties/ regards RedTimmy Security
Powered by blists - more mailing lists