Penetration Testing mailing list archives

Re: http fingerprinting


From: Bill Pennington <billp () boarder org>
Date: Wed, 9 Apr 2003 17:51:13 -0700

There is the WhiteHat webserver finger printing tool found here: http://www.whitehatsec.com/presentations.html

There is also a new version that should be coming out shortly.

On Tuesday, April 8, 2003, at 05:57 PM, Rick Hoekman wrote:

Anyone know if there are tools to fingerprint webservers that do not
give away their type and version?

As far as I know there is a paper/thesis on one tool called HMAP.pl. You
can read it here http://seclab.cs.ucdavis.edu/papers/hmap-thesis.pdf

Thanks!

Rick

--
"I know that you all think that I'm paranoid" -- anonymous
"Paranoia is knowing all the facts" -- Woody Allen
"Paranoia is reality seen on a finer scale." -- Philo Gant, Strange Days
"Paranoia is heightened awareness" -- anonymous


--------------------------------------------------------------
Costs are climbing and complaints are rising
as SPAM overloads your e-mail servers and Inboxes
SurfControl E-mail Filter puts the brakes on spam & viruses
and gives you the reports to prove it.
http://www.securityfocus.com/SurfControl-pen-test2
Download a free trial and see just
what's going in and out of your organization.
--------------------------------------------------------------



---
Bill Pennington, CISSP, CCNA
Senior Information Security Engineer
WhiteHat Security Inc.
http://www.whitehatsec.com


---
Bill Pennington, CISSP, CCNA
Senior Information Security Engineer
WhiteHat Security Inc.
http://www.whitehatsec.com


--------------------------------------------------------------
Costs are climbing and complaints are rising
as SPAM overloads your e-mail servers and Inboxes
SurfControl E-mail Filter puts the brakes on spam & viruses
and gives you the reports to prove it.
http://www.securityfocus.com/SurfControl-pen-test2
Download a free trial and see just
what's going in and out of your organization. --------------------------------------------------------------


Current thread: