Bypass sql injection filtering (whitespace, /, *)
I want to bypass a sql injection waf that replaces /,* and whitespaces.
This is a payload I want use :
?parameter=22321’union select CAST(normal_column AS bigint),’a’,’b’ from normal_table–
But the website replaces the whitespaces with n… Continue reading Bypass sql injection filtering (whitespace, /, *)