官术网_书友最值得收藏!

Determining active services

The final goal of the enumeration portion of reconnaissance is to identify the services and applications that are operational on the target system. If possible, the attacker would want to know the service type, vendor, and version to facilitate the identification of any vulnerability.

The following are some of the techniques used to determine active services:

  • Identify default ports and services: If the remote system is identified as having a Microsoft operating system with port 80 open (the WWW service), an attacker may assume that a default installation of Microsoft IIS is installed. Additional testing will be used to verify this assumption (nmap).
  • Banner grabbing: This is done using tools such as a map, netcat, nmap, and Telnet.
  • Review default web pages: Some applications install with default administration, error, or other pages. If attackers access these, they will provide guidance on installed applications that may be vulnerable to attack. In the following screenshot, the attacker can easily identify the version of Apache Tomcat that has been installed on the target system.
  • Review source code: Poorly configured web-based applications may respond to certain HTTP requests such as HEAD or OPTIONS with a response that includes the web server software version and, possibly, the base operating system or the scripting environment in use. In the following screenshot, netcat is launched from the command line and is used to send raw HEAD packets to a particular website. This request generates an error message (404 not found); however, it also identifies that the server is running Microsoft IIS, Version 7.5:
主站蜘蛛池模板: 抚州市| 海安县| 土默特右旗| 高碑店市| 普陀区| 武鸣县| 乌鲁木齐市| 通江县| 布拖县| 株洲县| 富锦市| 竹溪县| 怀宁县| 搜索| 龙里县| 寿宁县| 邯郸市| 定南县| 轮台县| 仁化县| 吕梁市| 崇明县| 霍邱县| 格尔木市| 卓尼县| 宕昌县| 金昌市| 山阳县| 会同县| 文安县| 扶沟县| 景德镇市| 平武县| 桐梓县| 同仁县| 二连浩特市| 敖汉旗| 灵宝市| 三都| 桦甸市| 阳春市|