For some "evil" purpose,we may need to test some web-site's security.To bypass the WAF,we may need do a little things on the scanner's detect packet.
Luckily,we have the great GNU tcp proxy code in hands,so we can archive our aim easily.
Its thought is like this:
scanner<-----(modify server response)proxy program(modify scanner's packet)------->web-site
1) by modifying the proxy's return packet to scanner,we can change the web server's HTTP-302-redirect reponse to HTTP-200-OK response.So we can go on using some good web-test-tool which may don't support the 302 response well;
2) by modifying the proxy's sending packet,we can also change the scanner's unique identification.It will help us bypass some WAF's stupid identifying technique.
Isn't easy?
the code can be downloaded from:
https://github.com/thomas1390/tool/tree/master/web%20scan%20diy%20it%20a%20little
any good suggestion, tell me,and thank you.
By the way,its behavior is like the famous fiddler,but fiddler will have to break many times when every packet arrives,which may don't apply to the scanner technique.
simple ways to cheat the waf and go on using the scanner
最新推荐文章于 2025-07-22 10:49:46 发布
本文介绍了一种使用GNU tcpx代理修改扫描器数据包的方法,以绕过Web应用防火墙(WAF),实现对网站安全性的有效测试。通过调整代理返回至扫描器的包,可以将HTTP-302重定向响应更改为HTTP-200 OK响应,使不支持302响应的测试工具得以继续工作;同时,修改发送的数据包,改变扫描器的独特标识,有助于规避某些WAF的识别机制。
2215

被折叠的 条评论
为什么被折叠?



