{"id":4073,"date":"2016-02-16T23:09:43","date_gmt":"2016-02-16T15:09:43","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4073"},"modified":"2016-02-16T23:09:54","modified_gmt":"2016-02-16T15:09:54","slug":"lnhg-massive-web-fingerprinter-mwebfp","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2016\/02\/lnhg-massive-web-fingerprinter-mwebfp\/","title":{"rendered":"LNHG – Massive Web Fingerprinter (mwebfp)"},"content":{"rendered":"

The LowNoiseHG (LNHG) Massive Web Fingerprinter was conceived in July 2013 after realizing the usefulness of webserver screenshots to pentesters, during an engagement with large external or internal IP address ranges, as a quick means of identification of critical assets, easily-exploitable services, forgotten\/outdated servers and basic network architecture knowledge of the target.<\/p>\n

\"LNHG<\/p>\n

The basic operation of mwebfp consists of the processing of an input (targets and TCP ports) that is then used to identify open web server ports with the help of a powerful portscanner (nmap). All ports found open are then analyzed (on HTTP and HTTPS) and all relevant webserver information is recorded, as well as a screenshot of the rendered webpage (as if it is seen from a broswer).<\/p>\n

Features<\/h3>\n