官术网_书友最值得收藏!

Gathering version info

When Nmap runs a port scan, it retrieves the port info (open/closed/filtered) and then gives us the default service that is running on that port. As one can run any service on any port, that may not be adequate information. If our attack requires a particular service on a particular port, gathering the default information may not be enough. We need to know what service is actually running on that port, not the default service. For instance, knowing that port 80 is open and running HTTP is good to know, but if our attack is specific to Apache, and the target has Microsoft's IIS running on that port, it won't work. We often need the service on the port.

Nmap has a feature that interrogates the service running on each port scanned. It can be used with the -sV switch. Type nmap -sV 192.168.10.70:

Note that, in the output we received, the server is running an older version of IIS on port 80. That makes a tempting target!

主站蜘蛛池模板: 西城区| 鹤庆县| 东至县| 乌鲁木齐县| 晋宁县| 营山县| 耿马| 富阳市| 自贡市| 黄陵县| 苏尼特左旗| 乌鲁木齐县| 辽阳市| 双峰县| 微山县| 明水县| 竹山县| 和平县| 五指山市| 泾源县| 昭苏县| 尼勒克县| 隆林| 潼关县| 平和县| 湖南省| 基隆市| 松溪县| 苏尼特右旗| 平泉县| 赞皇县| 宜城市| 陕西省| 柳州市| 铁岭县| 阳东县| 大化| 盐池县| 定安县| 开平市| 博乐市|