Cybersecurity for Everyone! Powered by NextGen AI!

WHATWEB (“What Is That Website?”)

The WhatWeb is a tool that is used to identify different web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. It has over 1700 plugins, each used to do something different.

Whatweb’s main use is to identify all sorts of information about a live website, like:

  • Platform
  • CMS platform
  • Type of Script
  • Google Analytics
  • Web server Platform
  • IP address, Country
  • 900+ Plugins & their libraries used
  • Server Headers, Cookies, and a lot more.

It is included in Kali Linux, and it can be accessed with the help of applications like 03 — Web Application Analysis | Web Vulnerability scanners, etc.

WhatWeb Features

  • Over 1700 plugins.
  • Controls the trade-off between speed/stealth and reliability.
  • Proxy support including TOR.
  • Custom HTTP headers.
  • Basic HTTP authentication.
  • Performance tuning. Control how many websites to scan concurrently.
  • Multiple log formats: Brief (greppable), Verbose (human readable), XML, JSON, MagicTree, RubyObject, MongoDB, SQL, and ElasticSearch.
  • Performance tuning. Control how many websites to scan concurrently.
  • Control over webpage redirection.
  • Nmap-style IP ranges.
  • Fuzzy matching.
  • Result certainty awareness.
  • Custom plugins are defined on the command line.




Enter URLs, filenames or nmap-format IP ranges.--input-file=FILE, -i Identify URLs found in FILE, eg. -i /dev/stdin


--url-prefix          Add a prefix to target URLs--url
-suffix               Add a suffix to target URLs
--url-pattern         Insert the targets into a URL. Requires --input-file,


The aggression level controls the trade-off between speed/stealth and reliability.
--aggression, -a=LEVEL Set the aggression level. Default: 1
Aggression levels are: 1,2,3 & 4


--user-agent, -U=AGENT Identify as AGENT instead of WhatWeb/0.4.8-dev.
--follow-redirect=WHEN Control when to follow redirects.Default: always
--max-redirects=NUM   Maximum number of contiguous redirects. Default: 10


--user, -u= HTTP basic authenticationAdd 
session cookies with --header, e.g. --header "Cookie: SESSID=1a2b3c;"


--proxy               <hostname[:port]> Set proxy hostname and port Default: 8080
--proxy-user          Set proxy user and password


--list-plugins, -l    List all plugins


--verbose, -v         Verbose output includes plugin descriptions. Use twice for debugging.
--colour,--color      WHEN control whether colour is used. WHEN='always', 'never' or 'auto'
--quiet, -q           Do not display brief logging to STDOUT
--no-errors           Suppress error messages


--log-brief=FILE      Log brief, one-line output
--log-verbose=FILE    Log verbose output
--log-xml=FILE        Log XML format


--max-threads, -t     Number of simultaneous threads. Default: 25.
--open-timeout        Time in seconds. Default: 15
--read-timeout        Time in seconds. Default: 30
--wait=SECONDS        Wait SECONDS between connections


--help, -h            This help
--debug               Raise errors in plugins
--version             Display version information. (WhatWeb 0.4.8-dev)

While WhatWeb is primarily a website fingerprinter it can also be used for spidering, banner grabbing, vulnerability scanning and data mining.

Example Usage:

Examples of how to use WhatWeb to scan.

Using WhatWeb to scan

Scan a single website :


This is the simplest way to scan a website. Specify a URL on the command-line.

Scan multiple websites


You can scan multiple websites by specifying the URLs on the commandline

Scan a list of URLs from a file

whatweb --input-file list.txt

You can scan the URLs specified in list.txt.

whatweb -i list.txt

It is faster to just type -i than — input-list.

Scan a network range

whatweb --no-errors

    Leave a Reply

    Understanding SSRF Attacks with Medieval Wisdom Decoding Phishing: A Visual Tale Digital Deception: The Cache Conspiracy Harnessing Auto-GPT for Penetration Testing with OSINT Understanding Docker Through the LEGO Analogy: A Comprehensive Guide