diff --git a/wafw00f/Dockerfile b/wafw00f/Dockerfile index bce6ee5..8d486b9 100644 --- a/wafw00f/Dockerfile +++ b/wafw00f/Dockerfile @@ -6,7 +6,7 @@ FROM alpine:3 MAINTAINER EasyPi Software Foundation RUN set -xe \ - && apk add --no-cache python3 + && apk add --no-cache python3 \ && pip3 install wafw00f ENTRYPOINT ["wafw00f"] diff --git a/wafw00f/README.md b/wafw00f/README.md index ec5f2a9..9f86fd6 100644 --- a/wafw00f/README.md +++ b/wafw00f/README.md @@ -4,9 +4,16 @@ wafw00f [WAFW00F][1] allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website. -``` +```bash $ alias wafw00f='docker run --rm -it vimagick/wafw00f' + $ wafw00f https://www.baidu.com +[*] Checking https://www.baidu.com +[+] Generic Detection results: +[*] The site https://www.baidu.com seems to be behind a WAF or some sort of security solution +[~] Reason: The server header is different when an attack is detected. +The server header for a normal response is "BWS/1.1", while the server header a response to an attack is "Apache", +[~] Number of requests: 7 ``` [1]: https://github.com/EnableSecurity/wafw00f