2020-09-15 09:11:34 +02:00
|
|
|
wafw00f
|
|
|
|
=======
|
|
|
|
|
|
|
|
[WAFW00F][1] allows one to identify and fingerprint Web Application Firewall
|
|
|
|
(WAF) products protecting a website.
|
|
|
|
|
2020-09-15 09:16:18 +02:00
|
|
|
```bash
|
2020-09-15 09:11:34 +02:00
|
|
|
$ alias wafw00f='docker run --rm -it vimagick/wafw00f'
|
2020-09-15 09:16:18 +02:00
|
|
|
|
2020-09-15 09:11:34 +02:00
|
|
|
$ wafw00f https://www.baidu.com
|
2020-09-15 09:16:18 +02:00
|
|
|
[*] Checking https://www.baidu.com
|
|
|
|
[+] Generic Detection results:
|
|
|
|
[*] The site https://www.baidu.com seems to be behind a WAF or some sort of security solution
|
|
|
|
[~] Reason: The server header is different when an attack is detected.
|
|
|
|
The server header for a normal response is "BWS/1.1", while the server header a response to an attack is "Apache",
|
|
|
|
[~] Number of requests: 7
|
2020-09-15 09:11:34 +02:00
|
|
|
```
|
|
|
|
|
|
|
|
[1]: https://github.com/EnableSecurity/wafw00f
|