栏目分类:
子分类:
返回
名师互学网用户登录
快速导航关闭
当前搜索
当前分类
子分类
实用工具
热门搜索
名师互学网 > IT > 系统运维 > 运维 > Linux

Wafw00f 防火墙检测 tools2

Linux 更新时间: 发布时间: IT归档 最新发布 模块sitemap 名妆网 法律咨询 聚返吧 英语巴士网 伯小乐 网商动力

Wafw00f 防火墙检测 tools2

安防工作![在这里插入图片描述](https://img

网站防火墙测试工具 wafw00f分享,仅用于安全测试,涉及非授权使用自行承担法律责任。

┌──(rootkali)-[/]
┌──(rootkali)-[/]
└─# wafw00f -h
Usage: wafw00f url1 [url2 [url3 … ]]
example: wafw00f http://www.victim.org/

Options:
-h, --help show this help message and exit
-v, --verbose Enable verbosity, multiple -v options increase
verbosity
-a, --findall Find all WAFs which match the signatures, do not stop testing on the first one
-r, --noredirect Do not follow redirections given by 3xx responses -t TEST, --test=TEST Test for one specific WAF
-o OUTPUT, --output=OUTPUT
Write output to csv, json or text file depending on file extension. For stdout, specify - as filename.
-i INPUT, --input-file=INPUT
Read targets from a file. Input format can be csv, json or text. For csv and json, a url column name or
element is required. -l, --list List all WAFs that WAFW00F is able to detect
-p PROXY, --proxy=PROXY
Use an HTTP proxy to perform requests, examples: http://hostname:8080, socks5://hostname:1080,
http://user:pass@hostname:8080
-V, --version Print out the current version of WafW00f and exit.
-H HEADERS, --headers=HEADERS
Pass custom headers via a text file to overwrite the
default header set.
┌──(rootkali)-[/]
└─# wafw00f www.baidu.com

            ______
           /      
          (  W00f! )
             ____/
           ,,    __            404 Hack Not Found
       |`-.__   / /                      __     __
       /"  _/  /_/                           / /
      *===*    /                           _/ /  405 Not Allowed
     /     )__//                              /
/|  /     /---`                        403 Forbidden
\/`    |                                 / _ 
`    /_\_              502 Bad Gateway  / /    500 Internal Error
  `_____``-`                             /_/   _

                    ~ WAFW00F : v2.1.0 ~
    The Web Application Firewall Fingerprinting Toolkit

[] Checking https://www.baidu.com
[+] Generic Detection results:
[
] The site https://www.baidu.com seems to be behind a WAF or some sort of security solution
[~] Reason: The server header is different when an attack is detected.
The server header for a normal response is “BWS/1.1”, while the server header a response to an attack is “Apache”,
[~] Number of requests: 7
(rootkali)-[/]

转载请注明:文章转载自 www.mshxw.com
本文地址:https://www.mshxw.com/it/725268.html
我们一直用心在做
关于我们 文章归档 网站地图 联系我们

版权所有 (c)2021-2022 MSHXW.COM

ICP备案号:晋ICP备2021003244-6号