tldr/pages/common/wafw00f.md

988 B

wafw00f

Identify and fingerprint Web Application Firewall (WAF) products protecting a website. More information: https://github.com/EnableSecurity/wafw00f.

  • Check if a website is using any WAF:

wafw00f {{https://www.example.com}}

  • Test for [a]ll detectable WAFs without stopping at the first match:

wafw00f --findall {{https://www.example.com}}

  • Pass requests through a [p]roxy (such as BurpSuite):

wafw00f --proxy {{http://localhost:8080}} {{https://www.example.com}}

  • [t]est for a specific WAF product (run wafw00f -l to get list of all supported WAFs):

wafw00f --test {{Cloudflare|Cloudfront|Fastly|ZScaler|...}} {{https://www.example.com}}

  • Pass custom [H]eaders from a file:

wafw00f --headers {{path/to/headers.txt}} {{https://www.example.com}}

  • Read target [i]nputs from a file and show verbose output (multiple v for more verbosity):

wafw00f --input {{path/to/urls.txt}} -v{{v}}

  • [l]ist all WAFs that can be detected:

wafw00f --list