This is a dedicated watch page for a single video.
Henry, a professional hacker, was attempting to bypass the WAF connected to the target network. To achieve his goal, Henry started fingerprinting the target WAF to identify the list of restricted or abandoned keywords. Using this information, he created a suitable regex and payloads to evade the WAF detection. Which of the following techniques did Henry abuse in the above scenario?