wafw00f 2.3.1-1 source package in Ubuntu

Changelog

wafw00f (2.3.1-1) unstable; urgency=medium

  * New upstream version 2.3.1 (Closes: #1087174)
  * debian/patches
    + Remove Fix-Python-3.12-syntax-warnings.patch
      + merge with upstream
  * debian/copyright
    + Extend debian copyright holders year
    + Update my lastname and email
  * debian/control
    + Update my lastname and email

 -- Daniel Echeverri <email address hidden>  Sat, 11 Jan 2025 16:58:57 -0500

Upload details

Uploaded by:
Debian Security Tools
Uploaded to:
Sid
Original maintainer:
Debian Security Tools
Architectures:
all
Section:
misc
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Questing release universe misc
Plucky release universe misc

Builds

Plucky: [FULLYBUILT] amd64

Downloads

File Size SHA-256 Checksum
wafw00f_2.3.1-1.dsc 2.0 KiB caef3d5f0488d28d5064cc701313cea3ad570b1becdb39e50404812ef2d9415a
wafw00f_2.3.1.orig.tar.gz 39.0 KiB 6b89d2f7d1195be72b1233486b0d6ead09e9dac9c741ae6a4daad9a73f7fcdc4
wafw00f_2.3.1-1.debian.tar.xz 3.4 KiB 9ceb9b1f2d4df18d8f73a7f28a60cf6caaa6a9109276b5aacf6bb09aff0abb9a

Available diffs

No changes file available.

Binary packages built by this source

wafw00f: identify and fingerprint Web Application Firewall products

 This package identifies and fingerprints Web Application Firewall (WAF)
 products using the following logic:
 .
  - Sends a _normal_ HTTP request and analyses the response; this identifies a
    number of WAF solutions.
  - If that is not successful, it sends a number of (potentially malicious)
    HTTP requests and uses simple logic to deduce which WAF it is.
  - If that is also not successful, it analyses the responses previously
    returned and uses another simple algorithm to guess if a WAF or security
    solution is actively responding to the attacks.