Tries to find out the technology behind the target website.
The script checks for certain defaults that might not have been changed, like common headers or URLs or HTML content.
While the script does some guessing, note that overall there's no way to determine what technologies a given site is using.
You can help improve this script by adding new entries to nselib/data/http-tools-fingerprints.lua
Each entry must have:
rapidDetect- Callback function that is called in the beginning
consumingDetect- Callback function that is called for each
Note that the
consumingDetect callback will not take place only if
rapid option is enabled.
boolean value that determines if a rapid detection should take place. The main difference of a rapid vs a lengthy detection is that second one requires crawling through the website. Default: false (lengthy detection is performed)
httpspider.doscraping, httpspider.maxdepth, httpspider.maxpagecount, httpspider.noblacklist, httpspider.url, httpspider.useheadfornonwebfiles, httpspider.withindomain, httpspider.withinhostSee the documentation for the httpspider library.
smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusernameSee the documentation for the smbauth library.
http.max-cache-size, http.max-pipeline, http.pipeline, http.useragentSee the documentation for the http library.
nmap -p80 --script http-devframework.nse <target>
PORT STATE SERVICE REASON 80/tcp open http syn-ack |_http-devframework: Django detected. Found Django admin login page on /admin/
Author: George Chatzisofroniou
License: Same as Nmap--See http://nmap.org/book/man-legal.html