EN
ENNA

CloudFlair

☁️ Cloud Recon · Python

CloudFlair is a tool for finding origin servers of websites protected by Cloudflare, using Internet-wide scan data from Censys. When a website uses Cloudflare as a reverse proxy, the actual origin server's IP address is hidden. CloudFlair works by searching Censys for IPv4 hosts that present an SSL certificate associated with the target domain, then checks each candidate to see if it responds with the same content as the Cloudflare-protected site. This technique is effective because many administrators configure SSL certificates on their origin servers that match the domain they're protecting, but forget to restrict direct IP access. It's a valuable tool for penetration testers looking to bypass Cloudflare's WAF and DDoS protection.

2.9kstars
380forks
11issues
Updated 11mo ago

Installation

from source

$ git clone https://github.com/christophetd/CloudFlair.git && cd CloudFlair && pip install -r requirements.txt

Use Cases

  • Finding the real IP address of Cloudflare-protected websites
  • Bypassing WAF and DDoS protection by targeting origin servers directly
  • Verifying that origin servers are properly locked down to Cloudflare IPs only
  • Identifying SSL certificate misconfigurations that leak origin server addresses

Tags

cloudflareorigin-ipcensysbypasswaf-evasionpentestpentest-tool

Alternatives & Comparisons

More in Cloud Recon