abuse-ssl-bypass-waf

Bypassing WAF by abusing SSL/TLS Ciphers

Github星跟踪图

abuse-ssl-bypass-waf

Helping you find the SSL/TLS Cipher that WAF cannot decrypt and Server can decrypt same time

Referer article: Bypassing Web-Application Firewalls by abusing SSL/TLS

Idea

Usage

python abuse-ssl-bypass-waf.py --help

If you can find keyword or regex when hit the WAF page, you can use:

python abuse-ssl-bypass-waf.py -regex "regex" -target https://target.com

or you cannot find keyword or regex when filter by WAF,you can use:

python abuse-ssl-bypass-waf.py -thread 4 -target https://target.com

Notice: If you are worry about WAF drop the connection, you have better not use -thread option.

Thirdparty

curl

sslcan

Notice: If your operation system is not Windows, you should be modify config.py ,adjust curl and sslscan path & command values.

Running

If you don't know what the type of the WAF, you can compare the html response content length and try to find the bypassing WAF ciphers

knowing the hit WAF page keyword or regex:

When using some SSL/TLS ciphers request the payload URL, If WAF keyword or regex not in html page, there is a way bypassing WAF using Cipher!

主要指标

概览
名称与所有者LandGrey/abuse-ssl-bypass-waf
主编程语言Python
编程语言Python (语言数: 1)
平台
许可证
所有者活动
创建于2018-07-05 17:53:37
推送于2021-07-27 03:38:27
最后一次提交2021-07-27 11:38:22
发布数0
用户参与
星数317
关注者数8
派生数73
提交数7
已启用问题?
问题数3
打开的问题数1
拉请求数0
打开的拉请求数0
关闭的拉请求数1
项目设置
已启用Wiki?
已存档?
是复刻?
已锁定?
是镜像?
是私有?