The Web Local
 

 

 

Whatweb

 

A next generation website identification scanner. With stealth-mode turned all the way up to 11 it's less intrusive than the Google crawler and eminently suitable for large scale internet scanning.

 

Whatweb has been coded to Identify content management systems (CMS), blogging platforms, stats/analytics packages, javascript libraries, servers and more.

 

WhatWeb has over 60 plugins and needs community support to develop more. Plugins can identify systems with obvious signs removed by looking for subtle clues. For example, a WordPress site might remove the tag <meta name="generator" content="WordPress 2.6.5"> but the WordPress plugin also looks for "wp-content" which is less easy to disguise. Plugins are flexible and can return any datatype, for example plugins can return version numbers, email addresses, account ID's and more.

 

There are both passive and aggressive plugins, passive plugins use information on the page, in cookies and in the URL to identify the system. Aggressive plugins guess URLs and request more files. Plugins are easy to write, you don't need to know ruby to make them.

 

Released 29th November, 2009 at the Kiwicon conference (kiwicon.org) in Wellington, New Zealand

 

Available from here

 

Pre-requisites

 

  • Ruby
  • ruby-dev
  • libopenssl-ruby
  • libxslt-ruby
  • libxslt1-dev
  • rubygems
  • Anemone

 

Installation

 

Ubuntu Linux


sudo apt-get install ruby ruby-dev libopenssl-ruby libxslt-ruby libxslt1-dev

 

Ubuntu 9.04, 9.10, etc. Install RubyGems

sudo apt-get install rubygems

 

For BackTrack 4 BETA, Ubuntu 8.04, etc
 

wget http://rubyforge.org/frs/download.php/45905/rubygems-1.3.1.tgz
tar xzvf rubygems-1.3.1.tgz
cd rubygems-1.3.1
sudo ruby setup.rb
sudo ln -s /usr/bin/gem1.8 /usr/bin/gem
sudo gem update –system

 

Note: - Warning this will remove all your gems

 

Install Anemone, Spidering library
 

sudo gem install anemone

 

Execution

 

whatweb [options] <URLs>

-i --input-file=FILE Identify URLs found in FILE
-a --aggression
      1 passive - on-page
      2 polite - follow on-page links if in the extra-urls list (default)
      3 impolite - try extra-urls when plugin matches (smart, guess a few urls)
      4 aggressive - try extra-urls for every plugin (guess a lot of urls)
-r --recursion, Follow links recursively. Only follows links under the path (default: off)
-d --depth, Maximum recursion depth (default: 3)
-m --max-links, Maximum number of links to follow on one page (default: 25)
-l --list-plugins, List the plugins
-p --run-plugins, Run comma delimited list of plugins. Default is to run all
-I --info-plugins, Display information about a comma delimited list of plugins. Default is all
-e --example-urls, Add example urls for each plugin to the target list
 

--colour=[WHEN],
--color=[WHEN] control whether colour is used. WHEN may be `never’, `always’, or `auto’
--log-full=FILE Log verbose output
--log-brief=FILE Log brief, one-line output
-U --user-agent, Identify as user-agent instead of WhatWeb/VERSION.
-t --max-threads, Number of simultaneous threads identifying websites in parallel (CPU intensive). Default is 5.
-h --help,
-v --verbose, Increase verbosity (recommended), use twice for debugging.

 

Expected Output:

 

 

IT Security News:

 

Pen Testing Framework:

 

Information: