Bypassing WAF by abusing SSL/TLS Ciphers.
Helping you find the SSL/TLS Cipher that WAF cannot decrypt and Server can decrypt same time.
Instructions on how to install the tool or package on BlackArch Linux.
pacman -S abuse-ssl-bypass-waf
If you can find a keyword or regex when hitting the WAF page, you can use:
abuse-ssl-bypass-waf -regex "regex" -target https://target.com
If no keywords or regex is present, you can use:
abuse-ssl-bypass-waf -thread 4 -target https://target.com
NOTE: If you are worried about the WAF dropping the connection, it is better to exclude the -thread
argument for your scan.
If you don’t know what the WAF type is, you can compare the HTML response contect lenght ad try to find the bypassing WAF ciphers.
If you know the keyword or regex for the WAF:
When utilizing certain SSL/TLS ciphers to request a payload URL, if a WAF keyword or regular expression is not present in the HTML page, it is possible to bypass the WAF by utilizing the Cipher.
Additional information on Bypassing Web-Application Firewalls by abusing SSL/TLS can be found here.
It is important to note that the use of this tool for any illegal or unauthorized activities is strictly prohibited. The creators of this tool and BlackArch Linux will not be held liable for any actions taken with its use. This tool is intended for use by security professionals and researchers for lawful and ethical testing purposes only. Remember, always obtain proper authorization and comply with all relevant laws and regulations when using this tool or any other security tool.