<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/MustLive Edition" -->
<rss version="2.0" 
	xmlns:content="http://purl.org/rss/1.0/modules/content/">
<channel>
	<title>Коментарі для запису: Fingerprinting of Apache web server</title>
	<link>http://websecurity.com.ua/3725/</link>
	<description></description>
	<pubDate>Mon, 13 Apr 2026 03:27:14 +0000</pubDate>
	<generator>http://wordpress.org/?v=MustLive Edition</generator>

	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/3725/#comment-307012</link>
		<pubDate>Fri, 04 Dec 2009 21:58:37 +0000</pubDate>
		<guid>http://websecurity.com.ua/3725/#comment-307012</guid>
					<description>&lt;strong&gt;DiabloHorn&lt;/strong&gt;

This method works with both mod_negotiation and MultiViews. But they are different features of Apache.

&lt;blockquote&gt;as far as I know it’s part of mod_negotiation&lt;/blockquote&gt;
MultiViews is a built-in feature of Apache. It works without mod_negotiation or any other module (it's core feature) - it works on my Apache 1.3.23 and I haven't mod_negotiation module. So attacks on MultiViews feature can work on any site on Apache with or without mod_negotiation ;-) (just MultiViews needs to be turned on).

I got to know about this module recently, when was publishing my article, when I was looking about information if Apache 2 support MultiViews. Yes it does support it (and I also found that there is such mod_negotiation module for Apache 1.3.x and 2.x).

I just looked at &lt;a href="http://httpd.apache.org/docs/2.0/mod/mod_negotiation.html" rel="nofollow"&gt;Apache Module mod_negotiation&lt;/a&gt; documentation and as I saw - this module support the same feature as MultiViews and much more (it's more advanced variant of it). If there is such module on server it overrides MultiViews functionality to itself (and adds new functionality) and if there is no such module, then built-in MultiViews works.</description>
		<content:encoded><![CDATA[<p><strong>DiabloHorn</strong></p>
<p>This method works with both mod_negotiation and MultiViews. But they are different features of Apache.</p>
<blockquote><p>as far as I know it’s part of mod_negotiation</p></blockquote>
<p>MultiViews is a built-in feature of Apache. It works without mod_negotiation or any other module (it&#8217;s core feature) - it works on my Apache 1.3.23 and I haven&#8217;t mod_negotiation module. So attacks on MultiViews feature can work on any site on Apache with or without mod_negotiation <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_wink.gif' alt=';-)' class='wp-smiley' />  (just MultiViews needs to be turned on).</p>
<p>I got to know about this module recently, when was publishing my article, when I was looking about information if Apache 2 support MultiViews. Yes it does support it (and I also found that there is such mod_negotiation module for Apache 1.3.x and 2.x).</p>
<p>I just looked at <a href="http://httpd.apache.org/docs/2.0/mod/mod_negotiation.html" rel="nofollow">Apache Module mod_negotiation</a> documentation and as I saw - this module support the same feature as MultiViews and much more (it&#8217;s more advanced variant of it). If there is such module on server it overrides MultiViews functionality to itself (and adds new functionality) and if there is no such module, then built-in MultiViews works.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: DiabloHorn</title>
		<link>http://websecurity.com.ua/3725/#comment-306971</link>
		<pubDate>Thu, 03 Dec 2009 22:48:52 +0000</pubDate>
		<guid>http://websecurity.com.ua/3725/#comment-306971</guid>
					<description>as far as I know it's part of mod_negotiation...oh well as long as the result is a nice list of files I'm happy ;)</description>
		<content:encoded><![CDATA[<p>as far as I know it&#8217;s part of mod_negotiation&#8230;oh well as long as the result is a nice list of files I&#8217;m happy <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_wink.gif' alt=';)' class='wp-smiley' />
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/3725/#comment-306967</link>
		<pubDate>Thu, 03 Dec 2009 21:49:40 +0000</pubDate>
		<guid>http://websecurity.com.ua/3725/#comment-306967</guid>
					<description>&lt;blockquote&gt;I wrote a small script for this a while ago&lt;/blockquote&gt;
You used module mod_negotiation as attack vector, and I used MultiViews option as attack vector. It's different attack vectors with similar idea. I never used mod_negotiation, so I'd read more about it and about your method of attack.

Automation of brute-forcing filenames at the servers it's good thing ;-), so everyone who interested can take a look at your script.

&lt;blockquote&gt;it is a nice method for additional information if it’s enabled.&lt;/blockquote&gt;
Indeed.</description>
		<content:encoded><![CDATA[<blockquote><p>I wrote a small script for this a while ago</p></blockquote>
<p>You used module mod_negotiation as attack vector, and I used MultiViews option as attack vector. It&#8217;s different attack vectors with similar idea. I never used mod_negotiation, so I&#8217;d read more about it and about your method of attack.</p>
<p>Automation of brute-forcing filenames at the servers it&#8217;s good thing <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_wink.gif' alt=';-)' class='wp-smiley' /> , so everyone who interested can take a look at your script.</p>
<blockquote><p>it is a nice method for additional information if it’s enabled.</p></blockquote>
<p>Indeed.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: DiabloHorn</title>
		<link>http://websecurity.com.ua/3725/#comment-306965</link>
		<pubDate>Thu, 03 Dec 2009 21:43:36 +0000</pubDate>
		<guid>http://websecurity.com.ua/3725/#comment-306965</guid>
					<description>Yeah I can understand that. I think we both agree that it is a nice method for additional information if it's enabled.

DiabloHorn</description>
		<content:encoded><![CDATA[<p>Yeah I can understand that. I think we both agree that it is a nice method for additional information if it&#8217;s enabled.</p>
<p>DiabloHorn
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/3725/#comment-306964</link>
		<pubDate>Thu, 03 Dec 2009 21:41:53 +0000</pubDate>
		<guid>http://websecurity.com.ua/3725/#comment-306964</guid>
					<description>&lt;strong&gt;DiabloHorn&lt;/strong&gt;

Thanks for information.

From conversation with other reader of my site in comments I know that it is documented and known for a long time feature of Apache (MultiViews). But I looked at it from other side - I used this future for hacking purposes (for fingerprinting and information leakage). I.e. it's Abuse of Functionality attack on Apache.

I created this method in September 2006 when found this Apache's behaviour (concerned with MultiViews). Only now I found time to write the article about it. But I used this method in my practice - particularly in 2007 I used it during security audit to find hidden information at the site of my client.

&lt;blockquote&gt;It can be turned off though and a lot of web servers don’t seem to use it.&lt;/blockquote&gt;
Yes, you are right. Mostly it's turned off nowadays at web sites in Internet, but earlier I found more web sites with it's turned on. Even with not large prevalence, this method is interesting and can be used for fingerprinting and information leakage attacks.</description>
		<content:encoded><![CDATA[<p><strong>DiabloHorn</strong></p>
<p>Thanks for information.</p>
<p>From conversation with other reader of my site in comments I know that it is documented and known for a long time feature of Apache (MultiViews). But I looked at it from other side - I used this future for hacking purposes (for fingerprinting and information leakage). I.e. it&#8217;s Abuse of Functionality attack on Apache.</p>
<p>I created this method in September 2006 when found this Apache&#8217;s behaviour (concerned with MultiViews). Only now I found time to write the article about it. But I used this method in my practice - particularly in 2007 I used it during security audit to find hidden information at the site of my client.</p>
<blockquote><p>It can be turned off though and a lot of web servers don’t seem to use it.</p></blockquote>
<p>Yes, you are right. Mostly it&#8217;s turned off nowadays at web sites in Internet, but earlier I found more web sites with it&#8217;s turned on. Even with not large prevalence, this method is interesting and can be used for fingerprinting and information leakage attacks.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: DiabloHorn</title>
		<link>http://websecurity.com.ua/3725/#comment-306909</link>
		<pubDate>Thu, 03 Dec 2009 00:35:37 +0000</pubDate>
		<guid>http://websecurity.com.ua/3725/#comment-306909</guid>
					<description>Heya,

interesting I wrote a small script for this a while ago:

http://diablohorn.wordpress.com/2009/07/16/bit-more-efficient-brute-forcing/

The feature is indeed been known for some time now, it's extremely nice if you want to have more results then your normal word list supports.

It can be turned off though and a lot of web servers don't seem to use it.

DiabloHorn</description>
		<content:encoded><![CDATA[<p>Heya,</p>
<p>interesting I wrote a small script for this a while ago:</p>
<p><a href="http://diablohorn.wordpress.com/2009/07/16/bit-more-efficient-brute-forcing/" rel="nofollow">http://diablohorn.wordpress.com/2009/07/16/bit-more-efficient-brute-forcing/</a></p>
<p>The feature is indeed been known for some time now, it&#8217;s extremely nice if you want to have more results then your normal word list supports.</p>
<p>It can be turned off though and a lot of web servers don&#8217;t seem to use it.</p>
<p>DiabloHorn
</p>
]]></content:encoded>
				</item>
</channel>
</rss>
