Results 1 to 2 of 2

Thread: Sniffer Fingerprinting

  1. #1
    Senior Member PacketThirst's Avatar
    Join Date
    Aug 2004

    Exclamation Sniffer Fingerprinting

    Hey folks ! ..

    I happened to use a sniffer for the first time a few hours ago.I just activated my Sniffer

    and started surfing as usual.I found the following packet quite interesting ...

    EN@/?mXP#oҬP2HTTP/1.1 304 Not Modified
    Date: Sun, 19 Sep 2004 02:01:49 GMT
    Server: Apache/1.3.29 (Unix) PHP/4.3.4
    Connection: close
    ETag: "6b5-154-3b50642e"

    This is a packet from AO. I guess that the packet gives out the web server information as well

    as its version number (Apache V1.3.29)!!.Isn't this really insecure ??. The stuff isn't even

    encrpted !!.Isn't there someway to stop this ????


  2. #2
    King Tutorial-ankhamun
    Join Date
    Jul 2004
    You could get the same info by doing a banner grab. Just telnet to port 80 ands hit enter twice. Some folks go to the trouble of masking what web server is being used, but most think it's not worth the bother.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts