
Sign up to save your podcasts
Or
Claroty Team82 researcher Noam Moshe joins the podcast to discuss his recent research and development of a generic bypass of leading vendors' web application firewalls.
This research was presented at Black Hat Europe and on the Team82 blog. The technique involves prepending JSON syntax to a SQL injection payload. Prior to this research, WAFs were blind to JSON syntax and would not flag these payloads as malicious.
All of the leading vendors have since added JSON support to their SQL injection processes.
5
1717 ratings
Claroty Team82 researcher Noam Moshe joins the podcast to discuss his recent research and development of a generic bypass of leading vendors' web application firewalls.
This research was presented at Black Hat Europe and on the Team82 blog. The technique involves prepending JSON syntax to a SQL injection payload. Prior to this research, WAFs were blind to JSON syntax and would not flag these payloads as malicious.
All of the leading vendors have since added JSON support to their SQL injection processes.
1,969 Listeners
361 Listeners
626 Listeners
1,046 Listeners
183 Listeners
1,004 Listeners
110,976 Listeners
7,883 Listeners
187 Listeners
20 Listeners
77 Listeners
7 Listeners
15,313 Listeners
33 Listeners
7 Listeners