June 2017
Intermediate to advanced
510 pages
11h 35m
English
Web application fingerprinting is the first task for penetration testers who want to know the version and type of a running web server and web technologies implemented. This information allows attackers to determine vulnerabilities and the appropriate exploits.
Attackers can utilize any type of command-line tool that has the capability to connect to the remote host. For example, we have used the netcat command in the following screenshot to connect to the victim host on port 80 and issue the HTTP HEAD command to identify what is being run on the server that returns the results in the HTTP server response; that includes the type of web server that the application is being run on, and the X-powered-By ...
Read now
Unlock full access