Fingerprinting
smugglex can identify the proxy/server stack before scanning, helping prioritize which checks are most likely to succeed.
Usage
smugglex --fingerprint https://target.com
Detected Servers
Nginx, Apache, Varnish, CloudFront, Cloudflare, HAProxy, Envoy, ATS (Apache Traffic Server), Squid, Caddy, IIS, Traefik, Akamai, Fastly, and more.
How It Works
Analyzes response headers (Server, Via, X-Powered-By, etc.) and behavior patterns to identify the proxy/server combination.
JSON Output
{
"fingerprint": {
"detected_proxy": "cloudflare",
"server": "cloudflare",
"via": null,
"x_powered_by": null
}
}
