Kembali ke Roadmap
// PHASE 2 · Technology Fingerprinting

Technology Fingerprinting

Technology Fingerprinting

Mengetahui teknologi yang digunakan target membantu mencari CVE yang relevan, default credentials, dan teknik exploit yang spesifik.

Tools

# Wappalyzer — browser extension # Install di Chrome/Firefox, otomatis deteksi teknologi # WhatWeb — CLI whatweb https://target.com whatweb -a 3 https://target.com # Aggressive mode # httpx — bulk fingerprinting cat subdomains.txt | httpx -tech-detect -status-code -title

Cara Manual

# Dari response headers curl -I https://target.com # Yang dicari: Server: Apache/2.4.49 ← CVE-2021-41773! X-Powered-By: PHP/7.2.0 ← PHP versi lama X-Generator: WordPress 5.8 ← Cek WP vulnerabilities

Identifikasi CMS

CMSCiri KhasTools Spesifik
WordPress/wp-content/, /wp-admin/WPScan
Joomla/administrator/, /components/JoomScan
Drupal/sites/default/, CHANGELOG.txtDroopescan
Magento/skin/frontend/, /downloader/Magescan
// CEK PEMAHAMAN
Header response apa yang langsung menunjukkan versi PHP yang digunakan server?
AContent-Type
BAuthorization
CX-Powered-By
DCache-Control
Directory & File Discovery Google Dorking & OSINT