Uniscan Webserver Fingerprinting Tutorial in Kali Linux

Uniscan is a simple but great tool for Remote File Include, Local File Include and Remote Command Execution vulnerability scanner. In this tutorial we will be exploring the webserver fingerprinting functionality in Uniscan on Kali Linux. The webserver fingerprinting functionality in Uniscan peforms a ping, traceroute, NS lookup, OS detection and service scan with Nmap on the specified target.

Uniscan Webserver fingerprinting Tutorial

Let’s start with opening a terminal and run Uniscan with the following command to get an overview of options:


Uniscan Webserver Fingerprinting -1

We will be running Uniscan again with the -j Server fingerprint flag on a specified target using the following command (this will take a little while to finish):

uniscan -u [target]-j


As mentioned earlier, Uniscan will perform a ping, traceroute, NS lookup and Nmap OS & Service scan. From which in particular the Nmap scans take a little while to finish. In the meantime we will be looking at the different scans in general and what they do:


The name ping comes from sonor terminology which uses sound and echo’s to detect objects underwater. As a network utility a Ping is used to test the reachability of a specified host. By sending and ICMP echo request packet to the specified host and waiting for a reply the roundtrip time can be measured and packet loss and reception will be calculated.


A trace route is a diagnostic tool for displaying the route and measuring transit delays of packets across an IP network. The path of the route is recorded together with the round-trip times from each successive host in the route. Traceroute continues unless all sent packets are lost more than twice, this means a loss of connection.

NS Lookup

NS Lookup stands for Name Server Lookup and is used to obtain the domain name or the IP address or for any other specific DNS record.

Nmap OS detection & Service scan

The Nmap OS detection scan returns the operating system of the specified host and the service scan does scan for ports and relates them to known services with the version number if available.

More information about the service scan can be read here.

When the scan is finished you can scroll back for the details Uniscan returned during the webserver fingerprinting scan:

Uniscan Webserver Fingerprinting -3

Another great feature of Uniscan is the option to export the results as a HTML page. The html page is stored at the following location (or click the link from the terminal):


In Kali Linux 2.0 the correct path to the report is:


Uniscan Webserver Fingerprinting -4


Security Analyst

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.