ComputerGuru 5 years ago

It’s a pretty poor implementation that is basically matching on the lowest common denominator, by platform rather than by library or framework. An ASP.NET website is fully independent of a WCF vulnerability. They can coexist but definitely don’t have to.

Additional suggestion: many times the home page is a link to many different technologies. Crawl all first-level directory indices to see different techs. E.g. we have a xenforo-powered forum at /forums, a WordPress blog at /blog, a custom ASP.NET CMS at /store, a .NET Core web app at /foo, etc.

The domain index for most companies past a certain age/size not dedicated solely to a single app effectively turns into a static html page.

wilsonthewhale 5 years ago

My static site running on OpenBSD 6.5 httpd gets identified as Apache ¯\_(ツ)_/¯

  • AndyMcConachie 5 years ago

    Same here. It also thinks I'm running PGP 7.1.31 when in fact I'm running 7.1.32.

  • KrishnaAnaril 5 years ago

    My Angular site is getting detected as Ruby on Rails :)

GiulioS 5 years ago

Creator here. We built this using Wappalyzer to detect the software given a URL and match it against our database of CVEs and thought it might be a fun little tool.

  • fnigi 5 years ago

    Is this released open-source ?

swiley 5 years ago

I pointed it at my lighttpd server and all I got was "cannot detect software" or so.

  • rubbingalcohol 5 years ago

    yep that's what I got. Tried on a couple of my web apps.

mellosouls 5 years ago

This is a nice addendum to the "Let Us Identify Your Stack" style web services tho I guess some of them might already provide this.

It does have the somewhat negative effect of making potentially vulnerable websites more visible to lower order hackers (I'm assuming more proficient ones have automated discovery tools like this anyway).

  • louisstow 5 years ago

    It's always a possibility but this tool doesn't look for version numbers so it's then more time consuming to narrow down if it's vulnerable to something.

babuskov 5 years ago

I tried entering a bunch of major websites. Looks like ibm.com is full of holes that need patching.

r1ch 5 years ago

Looks like it's overloaded - HTTP/502 on the API here.

  • louisstow 5 years ago

    Thanks. Increased the thread size so hopefully that should save it from all these hugs.

not_a_cop75 5 years ago

Finally, a place that can gather IP addresses and associate them to specific security products to have them hacked later. Just what I've been waiting for.

  • jdnenej 5 years ago

    Why do you think this is any easier than just scraping urls off the internet

    • Quekid5 5 years ago

      I'm always surprised by the mindset of the person you're replying to.

      I learned a few years ago from some DEFCON video[0] that someone had figured out a way to do a (basic) port scan of the whole internet in ~1 day (or something like that).

      Thing is... it really shouldn't have been that surprising. Although network latency isn't getting that much better year by year (c = c), the amount of data you can process in bulk, correlate, etc. is ever-increasing.

      [0] At least, I think that was the conference.

      • nighthawk454 5 years ago

        In fact, there's a tool that claims to scan the internet in 6 minutes: https://github.com/robertdavidgraham/masscan

        • not_a_cop75 5 years ago

          To be fair anything that is sending like this is probably getting you network blocks:

          "This program spews out packets very fast. On Windows, or from VMs, it can do 300,000 packets/second. On Linux (no virtualization) it'll do 1.6 million packets-per-second. That's fast enough to melt most networks."

        • Quekid5 5 years ago

          Yes, thank you, I think that was the one. Only missed by an order of magnitude or so.

      • not_a_cop75 5 years ago

        Port scanning is a real and established thing that anyone who is even thinking of security has known about normally for decades, but port scans don't tell everyone what your whole stack consists of. Maybe you'd like to share why sharing your stack with everyone is a good idea? I'd really like to know. Thank you.

        • Quekid5 5 years ago

          Do you think that fingerprinting is quantitatively different from port scanning? My main point was just that a port scan can immediately identify the 0.1% (or whatever) of the Internet that you're interested in and then try more "invasive" probing.

          (I should add that I forgot to mention that IpV6 does make the whole "PortScan the Internet" business a tad more complicated, so that's than argument against me.)

  • yjftsjthsd-h 5 years ago

    Wait until you hear about shodan...

    • not_a_cop75 5 years ago

      I've used Shodan. But seriously, please give me a list of real resources if you think you're up to the task.

  • louisstow 5 years ago

    We don't store anyones IP address and the results are only in memory cached.

    • not_a_cop75 5 years ago

      It's not you, but the implicit idea of trust. How are three people I know nothing about going to give me better results than a known name? Best of luck establishing yourselves though.

  • saagarjha 5 years ago

    Alternatively, secure your stack and don’t have it hacked later.

    • jamessteel 5 years ago

      Those self-managing their machines and sites could doubt if a break change or update would cause downtime, LXD/Docker could simplify on that and reduce the risk to only containers.

    • not_a_cop75 5 years ago

      Part of securing your stack is not sharing with everyone exactly what you have, or do you not study security at all?

  • lone_haxx0r 5 years ago

    Don't shoot the messenger.

    • not_a_cop75 5 years ago

      Or...interrogate the messenger when he tells you something that not even he is supposed to know.

mrlucax 5 years ago

Is there an open source alternative that could be self-hosted and configured to run automated and periodical checks?

jamessteel 5 years ago

Wasn’t able to detect what software my site use, my server name was disabled.

meesterdude 5 years ago

i don't need to provide my (potentially vulnerable) production URL to whoever-you-might-be in order to identify the last 6 months of vulnerabilities - I can just google for that.

Submitting your site to this is just asking for trouble.

  • paulfurley 5 years ago

    I’d suggest that running a vulnerable production service is asking for trouble!

    My web logs are full of automated scanners. Once when I ran a vulnerable version of Wordpress it got discovered and pwned very quickly. No need to enter the URL in any website ;)

  • bogwog 5 years ago

    This just seems like a mailing list for CVE alerts for popular software. If you put in HN, it'll say that it failed to detect the stack, and then ask you to choose your software and then enter your email to receive alerts.

    It's kind of clever marketing, giving people a sense that they're going to get a security audit in exchange for an email address.

    • paulfurley 5 years ago

      The first URL I entered (coop.co.uk) was actually pretty awesome, it detected Varnish and showed a critical CVE from last week. That’s cool.

      I hope that if you subscribe, the site regularly rescans your stack and realised if it’s changed. Otherwise it’s just a mailing list subscription that becomes out of date and therefore not useful.

  • landr0id 5 years ago

    Anyone can (and people are) just scan the internet for hosts on port 80/443 and unless your site uses virtual hosts and has no HTTPS certificates issued to one of your domains, it's going to be discovered and probed exactly like this site does anyways. The difference is real adversaries are doing it without you knowing.

  • adtac 5 years ago

    This is the textbook definition of security by obscurity.

    • tptacek 5 years ago

      It's not even that. There's no obscurity here. This is security by pretending.

      • jdnenej 5 years ago

        Security by head in the sand. Can't be any vulnerablities if I don't know about them.

  • heavenlyblue 5 years ago

    Then somebody else is going to do it for you.