Web application fingerprinting is a critical pre-invasion step, assuming that the name and version number of the Web application can be determined through fingerprint identification. The next step is to search the web for publicly available vulnerabilities. or online search its source code and then carry out a white box of vulnerability mining.
The core principle of fingerprint recognition is to match the MD5 value of a signature or matching file by means of a regular table. The main principle of fingerprint collection is the unique features of the program that do not change depending on the environment and configuration.
The fingerprint is primarily from the following content in the HTTP packet:
1, specify the path under the specified name of the JS file or code.
2. Specify a CSS file or code with the name specified under the path.
3, <title> content, some of the program title will be marked with the program, but not very much.
4. Meta tag with program identification <meta name= "description"/><meta name= "keywords"/><meta name= "generator"/><meta Name= "Author"/><meta name= "copyright"/> with program identification.
5, the copyright information in Display:none.
6, the bottom of the page copyright information,keyword© Powered by ET.
7, Readme.txt, License.txt, Help.txt and other documents.
8. Specify the image file under the specified path. such as some small icon files, background login page icon files, etc., the general administrator will not change them.
9, staring out of the HTML code <!--
10, the value of the HTTP header in the x-powered-by. Some application frameworks will output this value.
11. Keyword in cookies
12, robots.txt files in the keyword
Adhere to the collection of various procedures fingerprint, and then added to their own written scanner, the effect is very powerful.
watermark/2/text/ahr0cdovl2jsb2cuy3nkbi5uzxqvag91z3vhbje=/font/5a6l5l2t/fontsize/400/fill/i0jbqkfcma==/ Dissolve/70/gravity/center ">
Web application refers to fingerprint collection in recognition