Jump to content
Guest Zxald

LNHG – Massive Web Fingerprinter (mwebfp)

Recommended Posts

The LowNoiseHG (LNHG) Massive Web Fingerprinter was conceived in July 2013 after realizing the usefulness of webserver screenshots to pentesters, during an engagement with large external or internal IP address ranges, as a quick means of identification of critical assets, easily-exploitable services, forgotten/outdated servers and basic network architecture knowledge of the target.

 

test-640x570.png

 

The basic operation of mwebfp consists of the processing of an input (targets and TCP ports) that is then used to identify open web server ports with the help of a powerful portscanner (nmap). All ports found open are then analyzed (on HTTP and HTTPS) and all relevant webserver information is recorded, as well as a screenshot of the rendered webpage (as if it is seen from a broswer).

 

Features

 

Input

  • Target(s) can be IP address(es), IP address range(s), server name(s), etc.
  • Target(s) can be provided directly on the command-line or on a file

Port Definition

  • Default ports are 80 (HTTP) and 443 (HTTPS), but any port can be easily configured at runtime

Output

  • All output files and related support files for the scan are saved on a directory configured at runtime by the user
  • Currently, mwebfp exports results on a CSV file (Easily usable on MS Excel) only

Virtual Hosts

  • If requested at runtime, mwebfp will find all virutally hosted domains and webpages for the target server
  • Webserver Screenshots
  • If requested at runtime, mwebfp will grab screenshots of all found web pages (Graphical UI under Linux is required)

 

Usage

 

 

# LowNoiseHG Massive Web Fingerprinter

	# by F4Lc0N - LNHG - USA/Colombia

	#

	# Thanks to ET, c4an, Th3R3g3nt, ch0ks and ElJeffe311

	# for inspiration, ideas and debugging/beta-testing help.

	 

	usage: mwebfp.py [-h]

	                 [-i INPUT_RANGE | -n SERVER_NAME | -f INPUT_FILE | -r]

	                 [-p HTTP_PORTS] [-s HTTPS_PORTS] [-o OUTPUT_DIR]

	                 [-t {HTML,XLS,CSV,XML}] [-v {yes,no}] [-w {yes,no}]

	 

	optional arguments:

	  -h, --help            show this help message and exit

	  -i INPUT_RANGE, --input-range INPUT_RANGE

	                        input IP CIDR range

	  -n SERVER_NAME, --server-name SERVER_NAME

	                        name of server (DNS name)

	  -f INPUT_FILE, --input-file INPUT_FILE

	                        input file containing IP addresses and/or IP ranges

	  -r, --recover         recover/continue previous process

	  -p HTTP_PORTS, --http-ports HTTP_PORTS

	                        TCP HTTP ports (Default: 80/tcp)

	  -s HTTPS_PORTS, --https-ports HTTPS_PORTS

	                        TCP HTTPS ports (Default: 443/tcp)

	  -o OUTPUT_DIR, --output-dir OUTPUT_DIR

	                        working directory

	  -t {HTML,XLS,CSV,XML}, --output-format {HTML,XLS,CSV,XML}

	                        output report format (Default: HTML)

	  -v {yes,no}, --vhosts {yes,no}

	                        choice of processing vhosts for each IP address

	                        (Default: no)

	  -w {yes,no}, --web-screenshots {yes,no}

	                        choice of taking web schreenshots (Default: no)

 

 

Requirements

 

  • In order to run mwebfp “out-of-git”, with all options enabled, you will need:
  • Python – Programming language (sudo apt-get instal python)
  • nmap – Port Scanner (sudo apt-get install nmap)
  • python-nmap – Python module (apt-get install python-nmap)
  • requests – Python module (apt-get install python-requests)
  • cutycapt – Qt WebKit Capture Utility (You will need the latest version to be able to capture HTTPS pages – do NOT do apt-get !!!)
  • A graphical interface (GUI) on the *nix server you are running the script (I assume Linux)


You can download mwebfp here:

mwebfp-master.zip

 

Or read more here.

 

http://www.darknet.org.uk/2016/02/lnhg-massive-web-fingerprinter-mwebfp/

Edited by Zxald
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...