Web Application Firewall (WAF) Detection Scanner
In order to bypass the WAF, it is important to determine the WAF used in the system first.
Short Info
Level
Informational
Single Scan
Single Scan
Can be used by
Everyone
Estimated Time
1 minute
Time Interval
1 day
Scan only one
Domain, IPv4
Toolbox
-
What is WAF?
The system that protects web applications against web vulnerabilities is called a web application firewall (WAF).
The chosen waf must provide protection against the following vulnerabilities.
- SQL İnjection
- Cross-Site Scripting
- Command İnjection
- Local File İncluding
- Buffer Overflow
- Brute-Force Attack
- Cookie-Session Posioning
- Session Hijacking
- Sensitive Information Leaks
- Server Misconfiguration
- Wall-known latform Vulnerabilities
- Form-Hidden Field Manipulation
- Parameter Tamper
- Remote File İncluding
- File Upload