HMAP Web Server Fingerprinting

This script is Copyright (C) 2003-2017 Tenable Network Security, Inc. - HMAP research by Dustin Lee


Synopsis :

HMAP fingerprints the remote HTTP server.

Description :

Nessus was able to identify the remote web server type by sending
several valid and invalid HTTP requests. In some cases, its version
can also be approximated, as well as some options.

See also :

http://www.nessus.org/u?05d4ce87
http://seclab.cs.ucdavis.edu/papers/hmap-thesis.pdf
http://projects.webappsec.org/w/page/13246925/Fingerprinting

Solution :

n/a

Risk factor :

None

Family: Web Servers

Nessus Plugin ID: 11919 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now