abuse-ssl-bypass-waf: Bypassing WAF by abusing SSL/TLS Ciphers

abuse-ssl-bypass-waf

abuse-ssl-bypass-waf

Helping you find the SSL/TLS Cipher that WAF cannot decrypt and Server can decrypt same time

Referer article

Idea

Download

git clone https://github.com/LandGrey/abuse-ssl-bypass-waf.git

Usage

python abuse-ssl-bypass-waf.py --help

If you can find keyword or regex when hit the WAF page, you can use:

python abuse-ssl-bypass-waf.py -regex "regex" -target https://target.com

or you cannot find keyword or regex when filter by WAF, you can use:

python abuse-ssl-bypass-waf.py -thread 4 -target https://target.com

Notice: If you are worried about WAF drop the connection, you have better not use -thread option.

Third-party

curl

sslcan

Notice: If your operating system is not Windows, you should be modify config.py ,adjust curl and sslscan path & command values.

Running

If you don’t know what the type of the WAF, you can compare the html response content length and try to find the bypassing WAF cyphers

knowing the hit WAF page keyword or regex:

abuse-ssl-bypass-waf

 

When using some SSL/TLS cyphers request the payload URL, If WAF keyword or regex not in an html page, there is a way of bypassing WAF using Cipher!

Source: https://github.com/LandGrey/