Geek Culture

A new tech publication by Start it up (https://medium.com/swlh).

Member-only story

Fingerprinting a webserver + finding new web applications

--

Tools

  • Nmap
  • Nikto
  • Netcraft online tool
  • Wappalyzer browser plugin
  • Curl/wget to send malformed requests

Test for

  • nmap -sV ip_adr

-sV is the flag for banner grabbing

  • Nikto — host ip_addr

Nikto will automatically try banner grabbing

  • Wapplyzer browser plugin

Will auto analyse if possible

Some servers will respond differently to bad requests

Enumerating different webapps

  • Different baseURLs may refer to different applications, often we can only find these by directory brute forcing, for example https://google.com might go to the search engine but https://google.com/mail might point to a totally different webapp
  • Besides port 80 and 443 we should investigate anything that looks like a webserver. Use tools like nmap to enumerate all the open ports, -p- for all ports instead of top 1000 and -sU for UDP ports included
  • vHosts are different hosts on the same webserver, for example mail.google.com and www.google.com might point to the same webserver but they might return a different application based on the routing of the URL. We can use…

--

--

Thexssrat
Thexssrat

Written by Thexssrat

No b*llshit Hacking tutorials with extreme value in short bursts

Responses (1)