Sodamhan.com

TL;DR

wafw00f

Identify and fingerprint Web Application Firewall (WAF) products protecting a website. More information: https://github.com/EnableSecurity/wafw00f.

  • Check if a website is using any WAF:

wafw00f https://www.example.com

  • Test for all detectable WAFs without stopping at the first match:

wafw00f --findall https://www.example.com

  • Pass requests through a proxy (such as BurpSuite):

wafw00f --proxy http://localhost:8080 https://www.example.com

  • [t]est for a specific WAF product (run wafw00f -l to get list of all supported WAFs):

wafw00f --test Cloudflare|Cloudfront|Fastly|ZScaler|... https://www.example.com

  • Pass custom Headers from a file:

wafw00f --headers path/to/headers.txt https://www.example.com

  • Read target [i]nputs from a file and show verbose output (multiple v for more verbosity):

wafw00f --input path/to/urls.txt -vv

  • list all WAFs that can be detected:

wafw00f --list

This document was created using the contents of the tldr project.