Skip to content

Commit

Permalink
added a venv installer guide
Browse files Browse the repository at this point in the history
  • Loading branch information
ekultek committed Apr 24, 2018
1 parent 37d8e78 commit b0c4e7d
Showing 1 changed file with 15 additions and 2 deletions.
17 changes: 15 additions & 2 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,9 +8,9 @@ WhatWaf is an advanced firewall detection tool who's goal is to give you the ide
- Ability to detect over 40 different firewalls
- Ability to try over 20 different tampering techniques
- Ability to pass your own payloads either from a file, from the terminal, or use the default payloads
- Default payloads that are guaranteed to produce at least one WAF triggering
- Default payloads that _should_ produce at least one WAF triggering
- Ability to bypass firewalls using both SQLi techniques and cross site scripting techniques
- Ability to run behind multiple proxy types (`socks4`, `socks5`, `http`, `https` and `Tor`)
- Ability to run behind any proxy type that matches this regex:`(socks\d+)?(http(s)?)?://`
- Ability to use a random user agent, personal user agent, or custom default user agent
- Auto assign protocol to HTTP or ability to force protocol to HTTPS
- A built in encoder so you can encode your payloads into the discovered bypasses
Expand All @@ -30,6 +30,19 @@ pip install -r requirements.txt
EOF
```

You can also run whatwaf in a virtual environment by doing the following:
```bash
sudo -s << EOF
pip install virtualenv
git clone https://github.com/ekultek/whatwaf.git
cd whatwaf
chmod +x whatwaf.py
virtualenv venv && source venv/bin/activate
pip install -r requirements.txt
./whatwaf.py --help
EOF
```

# Proof of concept

First we'll run the website through WhatWaf and figure out which firewall protects it (if any):
Expand Down

0 comments on commit b0c4e7d

Please sign in to comment.