From 6f32ac130853e49e7d979d4e431b8e7cecbcf67d Mon Sep 17 00:00:00 2001 From: 0xInfection Date: Tue, 2 Apr 2019 20:39:40 +0530 Subject: [PATCH] Added some changes to existing fingerprints --- README.md | 24 +++++++++++++++++++++--- 1 file changed, 21 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 87aea6f..79787d7 100644 --- a/README.md +++ b/README.md @@ -1036,6 +1036,21 @@ Wanna fingerprint WAFs? Lets see how. + + + Nemesida Firewall + + + + + Netcontinuum (Barracuda) @@ -1392,7 +1407,7 @@ Wanna fingerprint WAFs? Lets see how.
  • Response page contains either of the following text snippet:
  • @@ -1615,8 +1630,10 @@ Wanna fingerprint WAFs? Lets see how.
  • Response headers may contain Sucuri or Cloudproxy keywords.
  • Blocked response page contains the following text snippet:
  • Response headers contains X-Sucuri-ID header along with normal requests.
  • @@ -2289,6 +2306,7 @@ Content-Length: 115 ``` The following table shows the support of different character encodings on the tested systems (when messages could be obfuscated using them): +> __TIP:__ You can use [this small python script](others/obfu.py) to convert your payloads and parameters to your desired encodings.