Exercise 1: Gathering Information About a Target Using WhatWeb
Scenario
WhatWeb identifies websites. It recognises web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more.
The objective of this lab is to help students learn how to:
Identify the target website technologies
Perform aggressive scans
Log output in an xml format
The objective of this lab is to help students learn how to:
Identify the target website technologies
Perform aggressive scans
Log output in an xml format
Lab Duration: 10 Minutes
- Click Kali Linux (External Network).
If Kali Linux lock screen appears, click on the screen and press Enter. If it does not appear, skip to the next task.
- Type root in the Username field and click Next.
- Type toor in the Password field and click Unlock.
- Launch a command line terminal from the taskbar, type whatweb and press Enter. It displays the list of commands used by whatweb.
- Assume www.luxurytreats.com is the target website. In this lab, you will be performing website fingerprinting on this website.
Type the command whatweb www.luxurytreats.com and press Enter.
- whatweb returns the luxurytreats website infrastructure as shown in the screenshot.
Ignore the warning messages.
- Since the result returned by whatweb is difficult to analyze, you can apply verbosity so that whatweb arranges the result in a clear way.
Type the command whatweb -v www.luxurytreats.com and press Enter.
- WhatWeb re-arranges the result in a better understandable manner as shown in the screenshot.
You may set WhatWeb in aggressivemode to obtain the version numbers of plugins used in the website.
- You can export the result returned by WhatWeb. To export the result to a text file, type the command whatweb --log-verbose=luxurytreats_report www.luxurytreats.com and press Enter.
This will generate a report with the name luxurytreats_report and saves this file in rootfolder.
- Navigate to root folder to find the report containing the result. To open root folder, go to Places --> Computer and double-click rootfolder.
- root folder appears, double-click luxurytreats_report.
- The report appears in the text file as shown in the screenshot. Analyze the result to get an idea about the website infrastructure.
- Close all the opened windows
In this lab, you have learned how to:
- Identify the target website technologies
- Perform aggressive scans
- Log output in an xml format
0 comments:
Post a Comment