"Hey all, just hit a client's website with an SQLi exploit and thought I'd start a discussion on bypassing firewalls to get access. Turns out, their basic WAF just wasn't enough to stop me - a bit of creative exploit chaining and I was in. Has anyone else encountered similar issues or have some tips to share on staying one step ahead?"