wig is a Python tool that identifies a websites CMS by searching for fingerprints of static files and extracting version numbers from known files.
OS identification is done by using the value of the ‘server’ and ‘X-Powered-By’ in the response header. These values are compared to a database of which package versions are include with different operating systems.
The version detection is based on md5 checksums of statics files, regex and string matching. OS detection is based on headers and packages listed in the ‘server’ header. There’s a quite large database of package versions included in common linux distros.
The author uses scripts to automatically update the md5 checksums for new versions of open source CMS the the tool is capable to detecting. This one of the main advantages over BlindElephant and WhatWeb.
There are some other tools similar to this such as:
And web services like http://builtwith.com/
There are currently three profiles for wig:
- Only send one request: wig only sends a request for ‘/’. All fingerprints matching this url are tested.
- Only send one request per plugin: The url used in most fingerprints is used
- All fingerprints: All fingerprints are tested
You can download wig here (or just clone it from the Github repo):
Or read more here.
- Radare – The Reverse Engineering Framework
- ZMap – Fast Open-Source Network Scanner
- Arachni v1.0 Released – Web Application Security Scanner Framework
- BlindElephant – Web Application Fingerprinter
- WhatWeb – Next Gen Web Scanner – Identify CMS (Content Management System)
- ASP.NET Memberships and Roles
Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,874,908 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,069,219 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 627,273 views