The fingerprints identify web applications deployed in the user's network, applications such as web administration interfaces to different IT manage systems.
The modules portion contains code to perform two basic attacks. The first is history browsing which determines if the user has visited the sites of interest. This reveals if the user is an administrator or power user. The second attack module within Yokoso! Initiates requests to map the infrastructure of the user's network.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.