Tasks
Footprint the Web Server
Information Gathering using Ghost Eye
Use the Ghost Eye information-gathering tool to gather information about the website certifiedhacker.com. Identify the name server (ns1) of certifiedhacker.com.
NS1.BLUEHOST
Use the Ghost Eye information-gathering tool to perform a clickjacking test on the website certifiedhacker.com. Enter YES if certifiedhacker.com is vulnerable to clickjacking attacks or NO otherwise.
YES
Footprint a Web Server using the httprecon tool
Install the httprecon tool on the Windows 11 machine (available at E:\CEH-Tools\CEHv12 Module 13 Hacking Web Servers\Web Server Footprinting Tools\httprecon) and footprint the domain www.certifiedhacker.com. Identify the default target port used by httprecon.
80
Footprint a Web Server using ID Serve
Footprint the domain www.certifiedhacker.com using the ID Serve tool and identify the webserver application used to host the webpages. Note: the ID Serve tool is available at E:\CEH-Tools\CEHv12 Module 13 Hacking Web Servers\Web Server Footprinting Tools\ID Serve.
nginx
Footprint a Web Server using Netcat and Telnet
Perform banner grabbing using Telnet on the website www.moviescope.com. Identify the web-server application used to host the website.
Microsoft-IIS/10.0
Enumerate Web Server Information using Nmap Scripting Engine (NSE)
Use Nmap Scripting Engine (NSE) to extract information about the website www.goodshopping.com. Enter the port number of the ms-wbt-server service, which is open on the web server.
3389
Use Nmap Scripting Engine (NSE) to check whether a web-application firewall is configured for the website www.goodshopping.com. Enter YES if a web-application firewall is configured for www.goodshopping.com or NO otherwise.
YES
Uniscan Web Server Fingerprinting in Parrot Security
Perform web-server fingerprinting on a WAMP server (the Windows Server 2022 machine) using the Uniscan tool. Identify the scripting language used for the development of the website hosted on the WAMP server.
PHP
Perform dynamic tests on a WAMP server (the Windows Server 2022 machine) using the Uniscan tool. Enter the server administrator’s email address found in the result.
admin@wampserver.invalid
Perform Web Server Attack
Crack FTP Credentials
Perform a dictionary attack using the THC Hydra tool to remotely access the FTP server hosted on the Windows 11 machine. Note: The wordlist file is located at CEHv12 Module 13 Hacking Web Servers/Wordlists. Enter the password of the user Martin.
apple
Perform a dictionary attack using the THC Hydra tool to remotely access the FTP server hosted on the Windows 11 machine. Enter the name of the user with the password “qwerty."
Jason
Last updated