TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Quarkslab

In WAF we (should not) trust

Keissy BOD · 2026-03-25 · Read original ↗

ATT&CK techniques detected

4 predictions
T1059.007JavaScript
66%
"[ ] + [ ] ) [! + [ ] +! + [ ] ] + (!! [ ] + [ ] ) [! + [ ] +! + [ ] +! + [ ] ] + (!! [ ] + [ ] ) [ +! + [ ] ] + (!! [ ] + [ ] ) [ + [ ] ] + ( [ ] [ (! [ ] + [ ] ) [ +! + [ ] ] + (!! [ ] + [ ] ) [ + [ ] ] ] + [ ] ) [ +! + [ ] + [ +! + [ ] ] ] + [ +! + [ ] ] + ( [ ] + [ ] + [ ] [ (…"
T1059.007JavaScript
60%
"same philosophy but uses a dollar sign and underscore based reduced charset built around a reference variable. these changes allow for shorter payloads. # jsfuck - > eval ( alert ( 1 ) ) [ ] [ (! [ ] + [ ] ) [ +! + [ ] ] + (!! [ ] + [ ] ) [ + [ ] ] ] [ ( [ ] [ (! [ ] + [ ] ) [ +!…"
T1059.007JavaScript
43%
"\ x2f \ 145 \ 164 \ 143 \ x2f \ 160 \ 141 \ 163 \ 163 \ 167 \ 144 ' - > cat / etc / passwd ( unix context ) * * hex encoding * * \ x61 \ x6c \ x65 \ x72 \ x74 \ x28 \ x31 \ x29 - > alert ( 1 ) cat $ ' \ x2f \ x65 \ x74 \ x63 \ x2f \ x70 \ x61 \ x73 \ x73 \ x77 \ x64 ' - > cat / e…"
T1027.010Command Obfuscation
32%
"$ _ $ _ + (! [ ] + " " ) [ $. _ $ _ ] + $. $ $ $ _ + " \ \ " + $. _ _ $ + $. $ $ _ + $. _ $ _ + $. _ _ + " ( \ \ \ " " + $. _ _ $ + " \ \ \ " \ \ " + $. $ _ _ + $. _ _ _ + " ) " + " \ " " ) ( ) ) ( ) ; this type of encoding is easily identifiable by its length but also by entropy…"

Summary

Deep dive into Web Application Firewall (WAF) bypasses, from misconfiguration exploitation to crafting obfuscated payloads. We show the impact of the parsing discrepancy between how a WAF reads a request and how a backend executes it. It is not a bug, it is a feature.