How I was able to bypass WAF and find the origin IP and a few sensitive files

--

--

--

Ethical Hacker || Penetration Tester || Security Researcher || Blogger || Cyber Security Consultant

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

HackTheBox Academy Writeup

{UPDATE} Pipe Lines : Hexa Hack Free Resources Generator

{UPDATE} Bullet Mission Hack Free Resources Generator

Analysis: Global risks, threat intelligence and UK legislation

ERC20 Token Development: The Ultimate Guide

{UPDATE} Kingdom Tales Hack Free Resources Generator

How to mint your own Digital Oceans V2 NFT straight from the contract!

4EVERLAND ✖ Relation: Support Web3 Social Graph Expansion with Efficient and Safe Data Storage…

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Jan Muhammad Zaidi

Jan Muhammad Zaidi

Ethical Hacker || Penetration Tester || Security Researcher || Blogger || Cyber Security Consultant

More from Medium

Internet-Wide Study: State Of SPF, DKIM, And DMARC — RedHunt Labs

Top intriguing hackers:

[Cryptohack] Logon Zero write up