官术网_书友最值得收藏!

Gathering version info

When Nmap runs a port scan, it retrieves the port info (open/closed/filtered) and then gives us the default service that is running on that port. As one can run any service on any port, that may not be adequate information. If our attack requires a particular service on a particular port, gathering the default information may not be enough. We need to know what service is actually running on that port, not the default service. For instance, knowing that port 80 is open and running HTTP is good to know, but if our attack is specific to Apache, and the target has Microsoft's IIS running on that port, it won't work. We often need the service on the port.

Nmap has a feature that interrogates the service running on each port scanned. It can be used with the -sV switch. Type nmap -sV 192.168.10.70:

Note that, in the output we received, the server is running an older version of IIS on port 80. That makes a tempting target!

主站蜘蛛池模板: 黔东| 阿勒泰市| 日土县| 舞阳县| 平阴县| 闽清县| 枣强县| 延川县| 汝南县| 江城| 黄石市| 英吉沙县| 合江县| 山阳县| 太康县| 图片| 平顶山市| 道真| 万安县| 高台县| 胶南市| 合江县| 扎赉特旗| 白银市| 通化市| 灵台县| 米泉市| 阿拉善左旗| 都兰县| 苍南县| 马龙县| 贵南县| 大城县| 鄂尔多斯市| 枞阳县| 罗甸县| 上杭县| 行唐县| 东丰县| 水城县| 浠水县|