-
Notifications
You must be signed in to change notification settings - Fork 2
Open
Description
Hi! Quick question about the PoC: the script runs detect_vulnerability() without any of the WAF-bypass options, and only applies bypass settings for the exploit request.
If a target is behind a WAF, wouldn’t the detection request get blocked too, causing false negatives? Could we either (a) add an option to apply the same request-shaping to detection, or (b) document that detection may fail behind a WAF and recommend version-based checks instead?
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels