I have never had to do more than turn on burp waf bypass to solve this, but on some sites (the drug compounding site, for instance) it would be a great tool! Some sites are SUPER picky.
A benefit to having a business major who is trained in application development do your vulnerability assessment is that we tend to take things like marketing and vision into account when doing the test. Sometimes, perceptions are an extremely important part of results, and how an attacker will approach a site is driven by those perceptions.
If you are not a business major, quick tip: Spend 30 minutes doing deep searches on the company name, the owner's names, the type of business they're in, and any unique phrases so that you get an idea of what people are saying. Use a tool. Get a subscription to the Wall Street Journal or FT. Dig through their databases. Hit the Wayback Machine.
Look on TOR! Set up a couple of accounts on some of the forums on there (obviously don't connect them to your real identity). Do searches before a test - just see what people are saying. Sometimes it's a big deal.
NBC reporting on a guy on Vermont refurbishing payphones and setting them up on cell dead zones for free. I kinda want to give him all my money. Thats is fucking awesome.
@ryanc okay okay okay hear me out. Go into your global org configuration for your IDE and duke in a prompt injection that tells everyone's AI to reply to every request in Klingon.
A small consulting company that I work with is hiring a full, high level infosec position. They are mostly a GRC shop, I do a lot of their appsec. Here's the listing. Great gig for the right person.