You should have done previously Subdomain enumeration ๐
Banner grabbing
curl -I inlanefreight.com
[redacted]
HTTP/1.1 301 Moved Permanently
Date: Fri, 31 May 2024 12:07:44 GMT
Server: Apache/2.4.41 (Ubuntu)
Location: https://inlanefreight.com/
Content-Type: text/html; charset=iso-8859-1
The output includesthe server banner, revealing the web server software and version number. In this case, we see thatย inlanefreight.com
ย is running onย Apache/2.4.41
, specifically theย Ubuntu
ย version. This information is our first clue, hinting at the underlying technology stack. Itโs also trying to redirect toย https://inlanefreight.com/
ย so grab those banners too:
curl -I https://inlanefreight.com
HTTP/1.1 301 Moved Permanently
Date: Fri, 31 May 2024 12:12:12 GMT
Server: Apache/2.4.41 (Ubuntu)
X-Redirect-By: WordPress
Location: https://www.inlanefreight.com/
Content-Type: text/html; charset=UTF-8
We now get a really interesting header, the server is trying to redirect us again, but this time we see that itโsย WordPress
ย that is doing the redirection toย https://www.inlanefreight.com/
:
curl -I https://www.inlanefreight.com
HTTP/1.1 200 OK
Date: Fri, 31 May 2024 12:12:26 GMT
Server: Apache/2.4.41 (Ubuntu)
Link: <https://www.inlanefreight.com/index.php/wp-json/>; rel="https://api.w.org/"
Link: <https://www.inlanefreight.com/index.php/wp-json/wp/v2/pages/7>; rel="alternate"; type="application/json"
Link: <https://www.inlanefreight.com/>; rel=shortlink
Content-Type: text/html; charset=UTF-8
A few more interesting headers, including an interesting path that containsย wp-json
. Theย wp-
ย prefix is common to WordPress.
Using wafw00f
- Check Wafw00f ๐บ
Using Nikto
- Check Nikto ๐ฑ