Closed WhatWaf-Firewalls closed 5 years ago
fixed look for it in the next push:
python whatwaf.py -u "http://www.fm.bank" --tor --skip
,------.
' .--. '
,--. .--. ,--. .--.| | | |
| | | | | | | |'--' | |
| | | | | | | | __. |
| |.'.| | | |.'.| | | .'
| | | | |___|
| ,'. |hat| ,'. |af .---.
'--' '--' '--' '--' '---'
"/><script>alert("WhatWaf?<|>v1.5.12($dev)");</script>
[09:10:32][WARN] you've chosen to skip bypass checks and chosen an amount of tamper to display, tampers will be skipped
[09:10:32][INFO] running behind proxy 'socks5://127.0.0.1:9050'
[09:10:32][INFO] using User-Agent 'whatwaf/1.5.12 (Language=2.7.16; Platform=Darwin)'
[09:10:32][INFO] using default payloads
[09:10:32][INFO] testing connection to target URL before starting attack
[09:10:33][SUCCESS] connection succeeded, continuing
[09:10:33][INFO] running single web application 'http://www.fm.bank'
[09:10:33][WARN] URL does not appear to have a query (parameter), this may interfere with the detection results
[09:10:33][INFO] request type: GET
[09:10:33][INFO] gathering HTTP responses
[09:10:46][INFO] gathering normal response to compare against
[09:10:47][INFO] loading firewall detection scripts
[09:10:47][INFO] running firewall detection checks
[09:10:51][FIREWALL] CloudFlare Web Application Firewall (CloudFlare)
[09:10:51][WARN] skipping bypass analysis
WhatWaf version:
1.5.12
Running context:./whatwaf.py -u ******************************************************************************************************************************** --tor
Fingerprint: