Step 1: Open Httprint
Let's start by opening httprint. Unfortunately, the GUI in BackTrack points to the wrong directory, so we need to open a terminal and type:- bt > cd /pentest/enumeration/web/httprint/linux
- ./httprint -h
- httprint -h <host> -s signatures.txt
Step 2: Test It in CNN.Com
Let's test it on cnn.com's website.- bt > ./httprint -h 157.166.226.25 -P0 -s signatures.txt
Reporting that you are running nginx is a good security strategy for cnn.com as there far fewer known vulnerabilities for nginx than IIS 6.0 This will help to divert most attackers, but not us!
Step 3: Let's Try Craigslist.org
Let's try the same on craigslist.org.- bt > ./httprint -h 208.82.238.129 -P0 -s signtaures.txt
Step 4: Finally, Let's Try Wikipedia.com
Let's try one more site and see what httprint tells us. Let's point it at wikipedia.com.- bt> ./httprint -h 208.80.154.224 -P0 -s signatures.txt
Httprint is another tool in our arsenal of reconnaissance tools to decipher the nature of the target. These tools are critical as nearly every exploit is specific, so we MUST determine what we are attacking BEFORE we attack.
0 (mga) komento:
Mag-post ng isang Komento