From 0624000bdb01d6cfb44e2b62d0426ab81113a166 Mon Sep 17 00:00:00 2001 From: Fazle Arefin Date: Sun, 30 Jun 2024 16:39:05 +1000 Subject: [PATCH] wafw00f: add page (#13204) * wafw00f: add page --------- Co-authored-by: spageektti Co-authored-by: Juri Dispan --- pages/common/wafw00f.md | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 pages/common/wafw00f.md diff --git a/pages/common/wafw00f.md b/pages/common/wafw00f.md new file mode 100644 index 0000000000..b2018732d7 --- /dev/null +++ b/pages/common/wafw00f.md @@ -0,0 +1,32 @@ +# wafw00f + +> Identify and fingerprint Web Application Firewall (WAF) products protecting a website. +> More information: . + +- Check if a website is using any WAF: + +`wafw00f {{https://www.example.com}}` + +- Test for [a]ll detectable WAFs without stopping at the first match: + +`wafw00f --findall {{https://www.example.com}}` + +- Pass requests through a [p]roxy (such as BurpSuite): + +`wafw00f --proxy {{http://localhost:8080}} {{https://www.example.com}}` + +- [t]est for a specific WAF product (run `wafw00f -l` to get list of all supported WAFs): + +`wafw00f --test {{Cloudflare|Cloudfront|Fastly|ZScaler|...}} {{https://www.example.com}}` + +- Pass custom [H]eaders from a file: + +`wafw00f --headers {{path/to/headers.txt}} {{https://www.example.com}}` + +- Read target [i]nputs from a file and show verbose output (multiple `v` for more verbosity): + +`wafw00f --input {{path/to/urls.txt}} -v{{v}}` + +- [l]ist all WAFs that can be detected: + +`wafw00f --list`