Sunday, 21 August 2011
Basic Web Server Version Fingerprinting Using Telnet Client
Hi this time I am presenting you a simple quick tip that can be used to fingerprint the web servers. This can be quite handy for basic fingerprinting to determine web server version.
At first, open your command prompt/terminal and then type:
If everything is working fine, type either of the below in the terminal(as per the protocol version) and then press ENTER twice to get result from the server:
or
It will output some HTML content with the basic web server information at the end. Sample output would like below:
Note that this method works only if the web server provides the HEAD method as one of its methods(Other methods you might have commonly heard are GET, and POST).
At first, open your command prompt/terminal and then type:
telnet
If everything is working fine, type either of the below in the terminal(as per the protocol version) and then press ENTER twice to get result from the server:
HEAD/ HTTP/1.1
or
HEAD/ HTTP/1.0
It will output some HTML content with the basic web server information at the end. Sample output would like below:
Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 Server at ds01.nepallink.net Port 80
Note that this method works only if the web server provides the HEAD method as one of its methods(Other methods you might have commonly heard are GET, and POST).
Labels:
fingerprinting
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget |
Basic Web Server Version Fingerprinting Using Telnet Client
2011-08-21T14:51:00+05:45
Cool Samar
fingerprinting|
Subscribe to:
Post Comments (Atom)