bars
π
The Red Book
search
circle-xmark
β
Ctrl
k
github
Edit
chevron-down
π¦³
Stages of Ethical Hacking
chevron-right
1οΈβ£
Information Gathering
chevron-right
Passive Information Gathering
Identify if site is protected by firewall or proxy - wafw00f
hashtag
wafw00f
GitHub repo for wafw00f
arrow-up-right
Usage
Copy
wafw00f
$DOMAIN_NAME
-a
Previous
DNS
chevron-left
Next
Subdomain Enumeration - Sublist3r
chevron-right
Last updated
3 years ago