whatweb
Identify technologies used by a website
TLDR
Scan websites/targets for web technologies
Read targets/websites from a file
Scan a website/target in verbose mode
Run an aggressive scan on a website
Scan a network and suppress errors
List plugins
List plugin details
SYNOPSIS
whatweb [options] <targets>
PARAMETERS
Specifies the target URL, IP address, CIDR range, or file containing targets to scan.
-v, --verbose
Enables verbose output, displaying more details during the scanning process.
-a, --aggression
Sets the aggression level (0-4), where higher levels increase the scan depth and time.
--input-file
Reads targets from a specified file, with one target per line.
--log-json
Logs the scan results to a specified file in JSON format.
--log-xml
Logs the scan results to a specified file in XML format.
--user-agent
Sets a custom User-Agent string for the HTTP requests made during the scan.
--plugins
Selects specific plugins to run (e.g., 'WordPress,Apache').
--no-plugins
Disables specific plugins from running during the scan.
--follow-redirects
Automatically follows HTTP redirects to new locations.
DESCRIPTION
whatweb is an open-source web scanner that identifies various web technologies used on websites. It employs numerous plugins to recognize content management systems (CMS), blogging platforms, JavaScript libraries, web servers, and other components. By analyzing HTML, HTTP headers, cookies, and other attributes, whatweb helps security professionals, developers, and system administrators gain insights into the technology stack of web applications. It supports multiple target inputs, including single URLs, IP addresses, CIDR ranges, and file lists, and offers diverse output formats for flexible reporting and integration into other tools.
CAVEATS
Scanning websites without explicit permission can be illegal or unethical. Always obtain proper authorization before performing any scans.
While generally accurate, whatweb might occasionally misidentify technologies or miss very new/obscure ones. High aggression levels or scanning a large number of targets can be time-consuming and resource-intensive, and may also trigger intrusion detection/prevention systems (IDS/IPS).
OUTPUT FORMATS
whatweb supports various output formats beyond brief and verbose, including XML, JSON, and Greappable (suitable for piping to other tools). This flexibility allows for easy integration into automated workflows, detailed reporting, or custom script processing.
PLUGIN SYSTEM
The modular plugin system is a core feature of whatweb. It allows for easy extension and customization, enabling users to create or modify plugins to identify specific technologies relevant to their unique requirements. This extensibility contributes significantly to its power and versatility.
HISTORY
whatweb was initially created by Andrew Horton (AJK) and first publicly released around 2009-2010. It quickly became a popular tool in the cybersecurity community for its efficiency in web technology identification. Since its inception, it has been actively maintained and regularly updated with new plugins and features to keep pace with the ever-evolving web technology landscape.