Provided by: wafw00f_0.9.4-1_all bug

NAME

       wafw00f - identify and fingerprint Web Application Firewall products

SYNOPSIS

       wafw00f url1 [url2 [url3 ... ]]

DESCRIPTION

       Identifies and fingerprints Web Application Firewall (WAF) products:

       To do its magic, WAFW00F does the following:
              Sends  a  normal HTTP request and analyses the response; this identifies a number of WAF solutions
              If that is not successful, it sends a number of (potentially malicious)  HTTP  requests  and  uses
              simple  logic  to deduce which WAF it is If that is also not successful, it analyses the responses
              previously returned and uses another simple algorithm to guess if a WAF or  security  solution  is
              actively responding to our attacks

OPTIONS

       -h, --help
              Show available options

       -v, --verbose
              Enable verbosity - multiple -v options increase verbosity

       -a, --findall
              Find all WAFs, do not stop testing on the first one

       -r, --disableredirect
              Do not follow redirections given by 3xx responses

       -t TEST, --test=TEST
              Test for one specific WAF

       -l, --list
              List all WAFs that we are able to detect

       -p PROXY, --proxy=PROXY
              Use an HTTP proxy to perform requests, example: http://hostname:8080, socks5://hostname:1080

       -V, --version
              Print out the version

       -H HEADERSFILE, --headersfile=HEADERSFILE
              Pass custom headers, for example to overwrite the default User-Agent string

AUTHORS

       Sandro Gauci
       Wendel G. Henrique

       This  manpage was written by Daniel Echeverry and Samuel Henrique for the Debian Project (but may be used
       by others), it was based on wafw00f's help output.

wafw00f                                           November 2017                                       WAFW00F(8)