Nmap Development mailing list archives

Re: HTTP server fingerprinting


From: Ron <ron () skullsecurity net>
Date: Thu, 20 Aug 2009 19:16:59 -0500

On 08/20/2009 11:14 AM, majek04 wrote:
The idea is to look at the http headers, and discover what
http server is running there:

http://www.computec.ch/projekte/httprecon/


This looks like a cool idea for NSE script.

Cheers :)
  Marek Majkowski

Hey Marek,

That sounds like a neat idea! I'm working on HTTP stuff right now, and I'm hoping to do more with Nmap's HTTP scripts as time goes on. I'll definitely consider this as I go along, unless somebody else does it first.

Another script I was thinking of (that may interest you?) is one that can query for DHCP info, either from a host or from a network. It'd be handy to get a list of DNS servers, the gateway, and anything else the DHCP server is thoughtful enough to provide.

Ron


--
Ron Bowes
http://www.skullsecurity.org/

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: