Files
cheatsheet-tldr/tldr/wafw00f
2024-07-01 00:16:59 +00:00

38 lines
1.1 KiB
Plaintext

---
syntax: markdown
tags: [tldr, common]
source: https://github.com/tldr-pages/tldr.git
---
# wafw00f
> Identify and fingerprint Web Application Firewall (WAF) products protecting a website.
> More information: <https://github.com/EnableSecurity/wafw00f>.
- Check if a website is using any WAF:
`wafw00f {{https://www.example.com}}`
- Test for [a]ll detectable WAFs without stopping at the first match:
`wafw00f --findall {{https://www.example.com}}`
- Pass requests through a [p]roxy (such as BurpSuite):
`wafw00f --proxy {{http://localhost:8080}} {{https://www.example.com}}`
- [t]est for a specific WAF product (run `wafw00f -l` to get list of all supported WAFs):
`wafw00f --test {{Cloudflare|Cloudfront|Fastly|ZScaler|...}} {{https://www.example.com}}`
- Pass custom [H]eaders from a file:
`wafw00f --headers {{path/to/headers.txt}} {{https://www.example.com}}`
- Read target [i]nputs from a file and show verbose output (multiple `v` for more verbosity):
`wafw00f --input {{path/to/urls.txt}} -v{{v}}`
- [l]ist all WAFs that can be detected:
`wafw00f --list`