During this phase of the scan, we perform an extended fingerprinting of the domains and the software they run. We will, for example, try to resolve the CMS (if any), the technology stack, the operating system and so forth. All this is done in order to customize the subsequent vulnerability scanning phase and activate additional tests applicable to the specific technology we have identified.
You will find the results from the fingerprinting phase in the informational findings (appearing in green) in the "All tests" view.
Click on the link at the bottom of the finding to be taken to the results.
Take a look at the findings to verify that we have correctly identified your technology stack or submit a report to us using the feedback card available on the dashboard in our UI (this might look different depending on your current price plan). This is also applicable in instances where you have purposely taken measures to hide your technology from detection.