blogs.night-wolf.ioHow I bypassed Akamai WAF and exploited SQL InjectionIn this blog, we will explore the process from the initial SQLi detection to bypassing the WAF, further exploiting the vulnerability, and collecting sensitive data. I. Introduction - What is Bypassing WAF? WAF = Web Application Firewall Bypassing WAF...Aug 28, 2024·12 min read