Categories: discovery, intrusive
Tries to detect the presence of a web application firewall and its type and version.
This works by sending a number of requests and looking in the responses for known behavior and fingerprints such as Server header, cookies and headers values. Intensive mode works by sending additional WAF specific requests to detect certain behaviour.
Credit to wafw00f and w3af for some fingerprints.
The base path. Defaults to
If set, will add WAF specific scans, which takes more time. Off by default.
slaxml.debugSee the documentation for the slaxml library.
http.host, http.max-body-size, http.max-cache-size, http.max-pipeline, http.pipeline, http.truncated-ok, http.useragentSee the documentation for the http library.
smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusernameSee the documentation for the smbauth library.
nmap --script=http-waf-fingerprint <targets> nmap --script=http-waf-fingerprint --script-args http-waf-fingerprint.intensive=1 <targets>
PORT STATE SERVICE REASON 80/tcp open http syn-ack | http-waf-fingerprint: | Detected WAF |_ BinarySec version 3.2.2
License: Same as Nmap--See https://nmap.org/book/man-legal.html