Fingerprinting
- extract details about the tech powering the app
- Allows:
- Targeted Attacks: based on the specific technologies being used
- Identifying Misconfigurations: expose misconfigured/outdated software, settings
- Prioritizing Targets: more efforts on vulnerable and sensitive targets
- Building a comprehensive Profile: combine recon data for a holistic view of target infra
Techniques:
- Banner Grabbing:
- Analyzing HTTP Headers:
- Probing for Specific Responses: craft requests to elicit unique responses
- Analyzing Page Content:
Commands:
curl -I https://inlanefreight.com
- Check if a website employs a WAF
- Install
wafw00f - pip3 install git+https://github.com/EnableSecurity/wafw00f
wafw00f inlanefreight.com
- Installing Nikto:
sudo apt update && sudo apt install -y perl
nikto -h inlanefreight.com -Tuning b
-Tuning b: Only run Software Identification Modules