Provided by: whatweb_0.5.0-1_all bug

NAME

       WhatWeb - Next generation Web scanner. Identify technologies used by websites.

SYNOPSIS

       whatweb [options] <URLs>

DESCRIPTION

       WhatWeb identifies websites. It's goal is to answer the question, "What is that Website?".
       WhatWeb recognises web technologies including content management systems  (CMS),  blogging
       platforms,  statistic/analytics  packages, JavaScript libraries, web servers, and embedded
       devices. WhatWeb has over 1800 plugins, each to  recognise  something  different.  WhatWeb
       also identifies version numbers, email addresses, account ID's, web framework modules, SQL
       errors, and more.

       WhatWeb can be stealthy and fast, or thorough but slow.  WhatWeb  supports  an  aggression
       level  to control the trade off between speed and reliability. When you visit a website in
       your browser, the transaction includes many hints of what web  technologies  are  powering
       that  website.  Sometimes a single webpage visit contains enough information to identify a
       website but when it does not, WhatWeb can interrogate the  website  further.  The  default
       level  of  aggression, called 'passive', is the fastest and requires only one HTTP request
       of a website. This is suitable for scanning public websites. More  aggressive  modes  were
       developed for in penetration tests.

       Most  WhatWeb  plugins  are thorough and recognise a range of cues from subtle to obvious.
       For example, most WordPress websites can be identified by the meta HTML tag,  e.g.  '<meta
       name="generator"  content="WordPress 2.6.5">', but a minority of WordPress websites remove
       this identifying tag but this does not thwart WhatWeb. The WordPress  WhatWeb  plugin  has
       over  15  tests,  which  include  checking  the favicon, default installation files, login
       pages, and checking for "/wp-content/" within relative links.

       Features:

            * Over 1800 plugins

            * Control the trade off between speed/stealth and reliability

            * Performance tuning. Control how many websites to scan concurrently.

            * Multiple log formats: Brief  (greppable),  Verbose  (human  readable),  XML,  JSON,
       MagicTree, RubyObject, MongoDB, SQL.

            * Proxy support including TOR

            * Custom HTTP headers

            * Basic HTTP authentication

            * Control over webpage redirection

            * IP address ranges

            * Fuzzy matching

            * Result certainty awareness

            * Custom plugins defined on the command line

            * IDN (International Domain Name) support

TARGET SELECTION

       <TARGETs>
              Enter  URLs,  hostnames, IP adddresses, filenames or IP ranges in CIDR, x.x.x-x, or
              x.x.x.x-x.x.x.x format.

       --input-file=FILE -i
              Identify URLs found in FILE

TARGET MODIFICATION

       --url-prefix
              Add a prefix to target URLs

       --url-suffix
              Add a suffix to target URLs

       --url-pattern
              Insert    the    targets    into    a    URL.    Requires     --input-file,     eg.
              www.example.com/%insert%/robots.txt

AGGRESSION

       The aggression level controls the trade-off between speed/stealth and reliability.

       --aggression -a=LEVEL
              Set the aggression level. Default: 1.

        1. Stealthy       Makes one HTTP request per target and also follows redirects.
        3. Aggressive     If a level 1 plugin is matched, additional requests will be made.
        4.  Heavy           Makes  a  lot  of HTTP requests per target. URLs from all plugins are
       attempted.

HTTP OPTIONS

       --user-agent, -U=AGENT
              Identify as AGENT instead of WhatWeb/0.4.9.

       --header, -H
              Add an HTTP header. eg "Foo:Bar". Specifying a  default  header  will  replace  it.
              Specifying an empty value, e.g. "User-Agent:" will remove it.

       --follow-redirect=WHEN
              Control  when  to  follow redirects. WHEN may be `never', `http-only', `meta-only',
              `same-site', or `always'. Default: always.

       --max-redirects=NUM
              Maximum number of redirects. Default: 10.

AUTHENTICATION

       --user, -u=<user:password>
              HTTP basic authentication.

       --cookie, -c=COOKIES
              Use cookies, e.g. 'name=value; name2=value2'.

PROXY

       --proxy <hostname[:port]> Set proxy hostname and port. Default: 8080.

       --proxy-user
              <username:password> Set proxy user and password.

PLUGINS

       --list-plugins, -l
              List all plugins.

       --info-plugins, -I=[SEARCH]
              List all plugins with detailed information. Optionally search with  keywords  in  a
              comma delimited list.

       --search-plugins=STRING
              Search plugins for a keyword.

       --plugins, -p=LIST
              Select  plugins. LIST is a comma delimited set of selected plugins. Default is all.
              Each element can be a directory, file or plugin name  and  can  optionally  have  a
              modifier, +/-.

       Examples: +/tmp/moo.rb,+/tmp/foo.rb
              title,md5,+./plugins-disabled/
              -p + is a shortcut for -p +plugins-disabled.

       --grep, -g=STRING|REGEXP
              Search for STRING or a Regular Expression. Shows only the results that match.

       Examples: --grep "hello"
              --grep "/he[l]*o/"

       --custom-plugin=DEFINITION
              Define a custom plugin named Custom-Plugin,

       Examples: ":text=>'powered by abc'"
       ":version=>/powered[ ]?by ab[0-9]/"
       ":ghdb=>'intitle:abc
       ":md5=>'8666257030b94d3bdb46e05945f60b42'"
       "{:text=>'powered by abc'}"

       --dorks=PLUGIN
       List Google dorks for the selected plugin.

OUTPUT

       --verbose, -v
              Verbose output includes plugin descriptions. Use twice for debugging.

       --colour,--color=WHEN
              control whether colour is used. WHEN may be `never', `always', or `auto'.

       --quiet, -q
              Do not display brief logging to STDOUT.

       --no-errors
              Suppress error messages.

LOGGING

       --log-brief=FILE
              Log brief, one-line output.

       --log-verbose=FILE
              Log verbose output.

       --log-errors=FILE
              Log errors.

       --log-xml=FILE
              Log XML format.

       --log-json=FILE
              Log JSON format.

       --log-sql=FILE
              Log SQL INSERT statements.

       --log-sql-create=FILE
              Create SQL database tables.

       --log-json-verbose=FILE
              Log JSON Verbose format.

       --log-magictree=FILE
              Log MagicTree XML format.

       --log-object=FILE
              Log Ruby object inspection format.

       --log-mongo-database
              Name of the MongoDB database.

       --log-mongo-collection
              Name of the MongoDB collection. Default: whatweb.

       --log-mongo-host
              MongoDB hostname or IP address. Default: 0.0.0.0.

       --log-mongo-username
              MongoDB username. Default: nil.

       --log-mongo-password
              MongoDB password. Default: nil.

       --log-elastic-index
              Name of the index to store results. Default: whatweb

       --log-elastic-host
              Host:port of the elastic http interface. Default: 127.0.0.1:9200s

PERFORMANCE & STABILITY

       --max-threads, -t
              Number of simultaneous threads. Default: 25.

       --open-timeout
              Time in seconds. Default: 15.

       --read-timeout
              Time in seconds. Default: 30.

       --wait=SECONDS
              Wait SECONDS between connections. This is useful when using a single thread.

HELP & MISCELLANEOUS

       --short-help
              Short usage help.

       --help, -h
              Complete usage help.

       --debug
              Raise errors in plugins.

       --version
              Display version information.

EXAMPLE USAGE

       Scan example.com.
               ./whatweb example.com

       Scan reddit.com slashdot.org with verbose plugin descriptions.
               ./whatweb -v reddit.com slashdot.org

       An aggressive scan of wired.com detects the exact version of WordPress.
               ./whatweb -a 3 www.wired.com

       Scan the local network quickly and suppress errors.
               whatweb --no-errors 192.168.0.0/24

       Scan the local network for https websites.
               whatweb --no-errors --url-prefix https://192.168.0.0/24

       Scan for crossdomain policies in the Alexa Top 1000.
               ./whatweb -i plugin-development/alexa-top-100.txt --url-suffix /crossdomain.xml -p
              crossdomain_xml

BUGS

       Report bugs and feature requests to https://github.com/urbanadventurer/WhatWeb

AUTHOR

       Developed by Andrew Horton (urbanadventurer) and Brendan Coles (bcoles).

HOMEPAGE

       https://www.morningstarsecurity.com/research/whatweb

SOURCECODE

       https://github.com/urbanadventurer/WhatWeb/

                                          June 8th, 2018                               WHATWEB(1)