Skip to content
A Bypass waF Scanner
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
BFscan.py
README.md

README.md

BFscan

BFscan is a tiny Bypass waF Scanner

基于python3实现规避防火墙的轻量级信息探测工具,采用python3默认模块,无需安装任何第三方模块即可使用。

本软件只做初步信息探测,无攻击性行为。请使用者遵守《中华人民共和国网络安全法》,勿将BFscan用于非授权的测试,本人不负任何连带法律责任。

防火墙规避策略

  • 基于telnetlib实现telnet扫描,可以达到一定bypass防火墙的效果
  • 支持ip段扫描(CIDR地址块),采取ip地址随机化,避免同一时间段对相邻ip进行扫描,尽量规避触发防火墙规则
  • 极限情况下,--slow参数设置单进程扫描,并在每次端口探测之前添加5-20秒的随机延迟

Usage

    ___   ___
  / __\ / __\__  ___ __ _ _ __
 /__\/// _\/ __|/ __/ _` | '_ \
/ \/  \ /  \__ \ (__ (_| | | | |
\_____\/   |___/\___\__,_|_| |_|

A Bypass waF  Scanner

starting......

Usage: BFscan.py [options]

Options:
  -h, --help            show this help message and exit
  -m MULTIPROCESS, --multiprocess=MULTIPROCESS
                        Num of multiprocess running concurrently, 30 by
                        default
  -t THREADS, --threads=THREADS
                        Num of scan threads for each scan process, 10 by
                        default
  --ip=IP               IP addresses. Ex: 192.168.0.1 or 192.168.1.0/24
  -p PORT, --port=PORT  Scan specified ports, default: 21-22,445,80-88,1433,27
                        017,3306,3389,6379,8080-8088,9200
  --timeout=TIMEOUT     Max timeout for each telnet connection, 10 by default
  --slow                Slow model to bypass waf,which will set threads=1 and
                        add random delay of 5-20 seconds for each port scan.
                        It will be very slow, please use it carefully.

本项目参考了PTscan项目,在此表示致谢

You can’t perform that action at this time.