Fingerprinting Port 80 Attacks – A look into web server, and web application attack signatures, Part Two. Includes fingerprints, advanced fingerprints, cross site scripting examples, modified headers, more encoding, webserver codes and logging, and more.
You can download it from the following link: https://packetstormsecurity.com/files/download/25871/fingerprinting-2.txt
Source: https://packetstormsecurity.com/files/25871/fingerprinting-2.txt.html

