安防工作![在这里插入图片描述](https://img
网站防火墙测试工具 wafw00f分享,仅用于安全测试,涉及非授权使用自行承担法律责任。
┌──(root💀kali)-[/]
┌──(root💀kali)-[/]
└─# wafw00f -h
Usage: wafw00f url1 [url2 [url3 … ]]
example: wafw00f http://www.victim.org/
Options:
-h, --help show this help message and exit
-v, --verbose Enable verbosity, multiple -v options increase
verbosity
-a, --findall Find all WAFs which match the signatures, do not stop testing on the first one
-r, --noredirect Do not follow redirections given by 3xx responses -t TEST, --test=TEST Test for one specific WAF
-o OUTPUT, --output=OUTPUT
Write output to csv, json or text file depending on file extension. For stdout, specify - as filename.
-i INPUT, --input-file=INPUT
Read targets from a file. Input format can be csv, json or text. For csv and json, a url
column name or
element is required. -l, --list List all WAFs that WAFW00F is able to detect
-p PROXY, --proxy=PROXY
Use an HTTP proxy to perform requests, examples: http://hostname:8080, socks5://hostname:1080,
http://user:pass@hostname:8080
-V, --version Print out the current version of WafW00f and exit.
-H HEADERS, --headers=HEADERS
Pass custom headers via a text file to overwrite the
default header set.
┌──(root💀kali)-[/]
└─# wafw00f www.baidu.com
______
/ \
( W00f! )
\ ____/
,, __ 404 Hack Not Found
|`-.__ / / __ __
/" _/ /_/ \ \ / /
*===* / \ \_/ / 405 Not Allowed
/ )__// \ /
/| / /---` 403 Forbidden
\\/` \ | / _ \
`\ /_\\_ 502 Bad Gateway / / \ \ 500 Internal Error
`_____``-` /_/ \_\
~ WAFW00F : v2.1.0 ~
The Web Application Firewall Fingerprinting Toolkit
[] Checking https://www.baidu.com
[+] Generic Detection results:
[] The site https://www.baidu.com seems to be behind a WAF or some sort of security solution
[~] Reason: The server header is different when an attack is detected.
The server header for a normal response is “BWS/1.1”, while the server header a response to an attack is “Apache”,
[~] Number of requests: 7
(rootkali)-[/]