Fingerprint / Identify Remote Web Server

htt‮w//:sp‬ww.lautturi.com
Fingerprint / Identify Remote Web Server

To fingerprint or identify a remote web server, you can use a tool called nmap. nmap is a network scanner that can be used to scan a network for hosts and servers, and it can also be used to fingerprint the operating system and software running on a server.

To fingerprint a remote web server using nmap, you can use the -A flag to enable OS and service detection, and specify the target hostname or IP address of the server.

For example:

$ nmap -A example.com

Starting Nmap 7.80 ( https://nmap.org ) at 2022-12-19 12:00 EST
Nmap scan report for example.com (192.0.2.1)
Host is up (0.14s latency).
Not shown: 998 closed ports
PORT     STATE SERVICE       VERSION
22/tcp   open  ssh           OpenSSH 8.2p1 Ubuntu 4 (Ubuntu Linux; protocol 2.0)
80/tcp   open  http          Apache httpd 2.4.41 ((Ubuntu))
443/tcp  open  ssl/http      Apache httpd 2.4.41 ((Ubuntu))
| ssl-cert: Subject: commonName=example.com
| Subject Alternative Name: DNS:example.com, DNS:www.example.com
| Not valid before: 2021-01-01T00:00:00
|_Not valid after:  2021-12-31T23:59:59

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 24.41 seconds

This nmap command will scan the example.com server for open ports and fingerprint the operating system and services running on the server. The nmap command will display the version of the operating system and the services running on the server, along with any other information it can gather.

Note that nmap may not be able to fingerprint all servers accurately, as servers can be configured to hide or falsify their version and OS information. However, nmap is a useful tool for quickly gathering information about a remote server, and it is widely used for network and security assessments.

Created Time:2017-10-28 20:40:31  Author:lautturi