diff --git a/waf/kona.py b/waf/kona.py new file mode 100644 index 000000000..146fab1e3 --- /dev/null +++ b/waf/kona.py @@ -0,0 +1,23 @@ +#!/usr/bin/env python + +""" +Copyright (c) 2006-2013 sqlmap developers (http://sqlmap.org/) +See the file 'doc/COPYING' for copying permission +""" + +import re + +from lib.core.settings import WAF_ATTACK_VECTORS + +__product__ = "KONA Security Solutions (Akamai Technologies)" + +def detect(get_page): + retval = False + + for vector in WAF_ATTACK_VECTORS: + page, headers, code = get_page(get=vector) + retval = code == 501 and re.search(r"Reference #[0-9A-Fa-f.]+", page, re.I) is not None + if retval: + break + + return retval diff --git a/waf/radware.py b/waf/radware.py new file mode 100644 index 000000000..951769b4f --- /dev/null +++ b/waf/radware.py @@ -0,0 +1,23 @@ +#!/usr/bin/env python + +""" +Copyright (c) 2006-2013 sqlmap developers (http://sqlmap.org/) +See the file 'doc/COPYING' for copying permission +""" + +import re + +from lib.core.settings import WAF_ATTACK_VECTORS + +__product__ = "AppWall (Radware)" + +def detect(get_page): + retval = False + + for vector in WAF_ATTACK_VECTORS: + page, headers, code = get_page(get=vector) + retval = re.search(r"Unauthorized Activity Has Been Detected.+Case Number:", page, re.I | re.S) is not None + if retval: + break + + return retval