# 1.Fingerprinting Web Technologies

Example: Azena on Intigriti\
<https://app.intigriti.com/researcher/programs/azena/azenaresponsibledisclosure/detail>

Step 1: Start with finding out how the website/web app is built with

1. Built With is a tool to figure how a website/web app is built\
   <https://builtwith.com>
2. Wappalyzer is the same as built with only that is an extension that we can use directly in browser to find similar information\
   <https://addons.mozilla.org/ro/firefox/addon/wappalyzer/>
3. curl method - by using curl directly in the terminal we can find similar information

   `curl -I -L azena.com`
4. Security Headers is a website that helps getting more information into the headers a specific web platform is using\
   <https://securityheaders.com/>
5. Using nmap (nmap tends to be better at scanning open ports not specific ports)

   `nmap -p443 -A azena.com`
