DOKK / manpages / debian 12 / wafw00f / wafw00f.8.en
WAFW00F(8) User Commands WAFW00F(8)

WAFW00F - Identify and fingerprint Web Application Firewall products

wafw00f url1 [url2 [url3 ... ]]

Sends a normal HTTP request and analyses the response; this identifies a number of WAF solutions. If that is not successful, it sends a number of (potentially malicious) HTTP requests and uses simple logic to deduce which WAF it is. If that is also not successful, it analyses the responses previously returned and uses another simple algorithm to guess if a WAF or security solution is active>

Show available options.
Enable verbosity - multiple -v options increase verbosity.
Find all WAFs, do not stop testing on the first one.
Do not follow redirections given by 3xx responses.
Test for one specific WAF product.
Write output to csv, json or text file depending on file extension. For stdout, specify - as filename.
Read targets from a file. Input format can be csv, json or text. For csv and json, a `url` column name or element is required.
List all the WAFs that WAFW00F is able to detect.
Use an HTTP proxy to perform requests, example: http://hostname:8080, socks5://hostname:1080.
Print out the version.
Pass custom headers, for example to overwrite the default user-agent string.

Sandro Gauci (@SandroGauci)
Pinaki Mondal (@0xInfection)

You can report bugs at the project homepage issue tracker: <https://github.com/EnableSecurity/wafw00f/issues/>.

Copyright (C) 2009-2022 WAFW00F Developers. License: BSD 3-Clause <https://opensource.org/licenses/BSD-3-Clause>.
This is free software: you are free to modify and distribute under the terms as permitted by the license provided alongwith.

Full documentation is available at: <https://github.com/EnableSecurity/wafw00f/wiki/>.

October 2020 wafw00f