abuse-ssl-bypass-waf

Bypassing WAF by abusing SSL/TLS Ciphers

Github星跟蹤圖

abuse-ssl-bypass-waf

Helping you find the SSL/TLS Cipher that WAF cannot decrypt and Server can decrypt same time

Referer article: Bypassing Web-Application Firewalls by abusing SSL/TLS

Idea

Usage

python abuse-ssl-bypass-waf.py --help

If you can find keyword or regex when hit the WAF page, you can use:

python abuse-ssl-bypass-waf.py -regex "regex" -target https://target.com

or you cannot find keyword or regex when filter by WAF,you can use:

python abuse-ssl-bypass-waf.py -thread 4 -target https://target.com

Notice: If you are worry about WAF drop the connection, you have better not use -thread option.

Thirdparty

curl

sslcan

Notice: If your operation system is not Windows, you should be modify config.py ,adjust curl and sslscan path & command values.

Running

If you don't know what the type of the WAF, you can compare the html response content length and try to find the bypassing WAF ciphers

knowing the hit WAF page keyword or regex:

When using some SSL/TLS ciphers request the payload URL, If WAF keyword or regex not in html page, there is a way bypassing WAF using Cipher!

主要指標

概覽
名稱與所有者LandGrey/abuse-ssl-bypass-waf
主編程語言Python
編程語言Python (語言數: 1)
平台
許可證
所有者活动
創建於2018-07-05 17:53:37
推送於2021-07-27 03:38:27
最后一次提交2021-07-27 11:38:22
發布數0
用户参与
星數317
關注者數8
派生數73
提交數7
已啟用問題?
問題數3
打開的問題數1
拉請求數0
打開的拉請求數0
關閉的拉請求數1
项目设置
已啟用Wiki?
已存檔?
是復刻?
已鎖定?
是鏡像?
是私有?