[&] Why might you want to use multiple tools (like BuiltWith and Wapalyzer) for web application fingerprinting? - To speed up the fingerprinting process - To automatically exploit identified vulnerabilities - To confuse website owners and security systems - To ensure accuracy and get complementary information about the web technologies being used [&] Which of the following tools is used as a browser extension for web application fingerprinting? - nmap - sqlmap - Wireshark - Wapalyzer [&] What kind of information can 'BuiltWith' browser extension provide? - DNS records of the website - User credentials of website admins - Server uptime - List of technologies and frameworks used by the website [&] What type of information can you gather using the 'WhatWeb' command-line utility? - Social media profiles of website owners - Local area network traffic statistics - Information about server-side technologies and HTTP headers - Physical location of the server [&] Which command-line tool comes pre-packaged with Kali Linux and is used for passive web application fingerprinting? - WhatWeb - netcat - Metasploit - tcpdump [&] What is the main purpose of passive web application fingerprinting? - To actively attack web applications - To identify website ownership details - To detect the technologies and frameworks used by the web application without actively interacting with it - To prevent unauthorized access to the web application