Closed WhatWaf-Firewalls closed 4 years ago
python whatwaf.py -u "http://naturiste.ca" -p 81*1*1*1*1*1*1* --tor
,------.
' .--. '
,--. .--. ,--. .--.| | | |
| | | | | | | |'--' | |
| | | | | | | | __. |
| |.'.| | | |.'.| | | .'
| | | | |___|
| ,'. |hat| ,'. |af .---.
'--' '--' '--' '--' '---'
%00/><script>alert("WhatWaf?<|>v1.6.11($dev)");</script>
[20:01:09][INFO] checking for updates
[20:01:09][INFO] running behind proxy 'socks5://127.0.0.1:9050'
[20:01:09][INFO] using User-Agent 'whatwaf/1.6.11 (Language=2.7.15rc1; Platform=Linux)'
[20:01:09][INFO] using provided payloads
[20:01:09][INFO] testing connection to target URL before starting attack (Tor is initialized which may increase latency)
[20:01:11][SUCCESS] connection succeeded, continuing
[20:01:11][INFO] running single web application 'http://naturiste.ca'
[20:01:11][WARN] URL does not appear to have a query (parameter), this may interfere with the detection results
[20:01:11][INFO] request type: GET
[20:01:11][INFO] gathering HTTP responses
[20:01:13][INFO] gathering normal response to compare against
[20:01:13][INFO] loading firewall detection scripts
[20:01:13][INFO] running firewall detection checks
[20:01:20][FIREWALL] detected website protection identified as 'CloudFlare Web Application Firewall (CloudFlare)'
[20:01:20][INFO] starting bypass analysis
[20:01:20][INFO] loading payload tampering scripts
[20:01:20][INFO] running tampering bypass checks
^C[20:01:22][FATAL] user aborted scanning
can't reproduce, email me the actual link and lemme know when its done
WhatWaf version:
1.6.11
Running context:whatwaf.py -u ************************************************************************************** -p 81*1*1*1*1*1*1*
Fingerprint: