Detecting web application firewalls
Web servers are often protected by packet filtering systems that drop or redirect suspected malicious packets. Web penetration testers benefit from knowing that there is a traffic filtering system between them and the target application. If that is the case, they can try more rare or stealthy techniques to try to bypass the Web Application Firewall (WAF) or Intrusion Prevention System (IPS). It also helps them to determine if a vulnerability is actually exploitable in the current environment.
This recipe demonstrates how to use Nmap to detect packet filtering systems such as a Web Application Firewall or an Intrusion Prevention System.
How to do it...
To detect a Web Application Firewall or Intrusion Prevention System:
$ nmap -p80 --script http-waf-detect <target>
The script http-waf-detect
will let you know if a packet filtering system was detected:
PORT STATE SERVICE 80/tcp open http |_http-waf-detect: IDS/IPS/WAF detected
How it works...
The argument...