nowafpls Burp plugin bypasses WAF by inserting junk data

Currently reading:
 nowafpls Burp plugin bypasses WAF by inserting junk data

databrowser

Member
LV
1
Joined
Jul 27, 2024
Threads
25
Likes
1
Awards
4
Credits
1,073©
Cash
0$


Link:
Most web application firewalls (WAFs) have limits on the amount of data they can process when sending a request body.This means that for HTTP requests that include a request body (i.e. POST, PUT, PATCH, etc.),Often a WAF can be bypassed simply by prepending junk data to the request body.

When the request is filled with this garbage data, the WAF will process the request up to X kb and analyze it, but everything after the WAF limit will just pass through.

nowafpls is a simple Burp plugin that will insert this junk data into the HTTP request inside the repeater tab. You can choose from a preset number of junk data or insert any amount of junk data by selecting the "Custom" option.



Install nowafpls​

nowafpls is a Jython-based Burp plugin.

  1. Clone or download this repo.
  2. Go to the Extensions tab in Burp Suite.
  3. Click "Add"
  4. Select Extension Type – Python
  5. Select the "nowafpls.py" you downloaded in step 1

How to use nowafpls​

  1. Send any requests that you want to bypass the WAF to the Repeater tab.
  2. Place the cursor where you want to insert the junk data.
  3. Right click -> Extensions -> nowafpls
  4. Choose how much garbage data to insert
  5. Click "OK"

Screenshot2024 08 06 000258
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips

Similar threads

Top Bottom