Blind WAF identification tool
Project description
identYwaf is an identification tool that can recognize web protection type (i.e. WAF) based on blind inference. Blind inference is being done by inspecting responses provoked by a set of predefined offensive (non-destructive) payloads, where those are used only to trigger the web protection system in between (e.g. http://<host>?aeD0oowi=1 AND 2>1). Currently it supports more than 80 different protection products (e.g. aeSecure, Airlock, CleanTalk, CrawlProtect, Imunify360, MalCare, ModSecurity, Palo Alto, SiteGuard, UrlScan, Wallarm, WatchGuard, Wordfence, etc.), while the knowledge-base is constantly growing.
For more information you can check slides for a talk “Blind WAF identification” held at Sh3llCON 2019 (Santander / Spain).
Installation
You can use pip to install and/or upgrade the identYwaf to latest (PyPI) version with:
pip install --upgrade identYwaf
Alternatively, you can download the latest tarball by clicking here or latest zipball by clicking here.
identYwaf works out of the box with Python version 2.6, 2.7 and 3.x on any platform.
Usage
To get a list of basic options and switches use:
identYwaf -h
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file identYwaf-1.0.127.tar.gz
.
File metadata
- Download URL: identYwaf-1.0.127.tar.gz
- Upload date:
- Size: 21.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: Python-urllib/2.7
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 34ab6da210c5d455d7ef66de5b8a29357008522d22c2901f5cd6dfa8614f83fb |
|
MD5 | 4d87966c8f55667b9337f9901a371263 |
|
BLAKE2b-256 | 250fd62373bf1b942ad2dccc84542fd9787879232de426e4ec423025b02cb97e |