![Nexus: A Claroty Podcast artwork](https://is4-ssl.mzstatic.com/image/thumb/Podcasts124/v4/59/0a/32/590a3234-0912-1abb-51b4-1552a2ee8ff8/mza_3095121673409303289.jpg/100x100bb.jpg)
Noam Moshe on a Generic WAF Bypass Technique
Nexus: A Claroty Podcast
English - December 19, 2022 18:00 - 30 minutes - 21.1 MB - ★★★★★ - 4 ratingsTechnology Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
Previous Episode: Sharon Brizinov on Hacking IoT
Claroty Team82 researcher Noam Moshe joins the podcast to discuss his recent research and development of a generic bypass of leading vendors' web application firewalls.
This research was presented at Black Hat Europe and on the Team82 blog. The technique involves prepending JSON syntax to a SQL injection payload. Prior to this research, WAFs were blind to JSON syntax and would not flag these payloads as malicious.
All of the leading vendors have since added JSON support to their SQL injection processes.