- Applied Network Security
- Arthur Salmon Warun Levesque Michael McLafferty
- 171字
- 2021-07-02 23:31:01
Gathering version info
When Nmap runs a port scan, it retrieves the port info (open/closed/filtered) and then gives us the default service that is running on that port. As one can run any service on any port, that may not be adequate information. If our attack requires a particular service on a particular port, gathering the default information may not be enough. We need to know what service is actually running on that port, not the default service. For instance, knowing that port 80 is open and running HTTP is good to know, but if our attack is specific to Apache, and the target has Microsoft's IIS running on that port, it won't work. We often need the service on the port.
Nmap has a feature that interrogates the service running on each port scanned. It can be used with the -sV switch. Type nmap -sV 192.168.10.70:

Note that, in the output we received, the server is running an older version of IIS on port 80. That makes a tempting target!
- 數(shù)據(jù)恢復方法及案例分析
- 工業(yè)互聯(lián)網(wǎng)安全
- Practical Network Scanning
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- 網(wǎng)絡(luò)安全意識導論
- 深入淺出隱私計算:技術(shù)解析與應用實踐
- Web安全與攻防入門很輕松(實戰(zhàn)超值版)
- 學電腦安全與病毒防范
- 網(wǎng)絡(luò)安全設(shè)計、配置與管理大全
- 數(shù)據(jù)要素安全:新技術(shù)、新安全激活新質(zhì)生產(chǎn)力
- 黑客攻防從入門到精通:命令版
- 黑客攻防與電腦安全從新手到高手(超值版)
- 網(wǎng)絡(luò)入侵檢測系統(tǒng)原理與應用
- 黑客攻防從入門到精通:黑客與反黑客工具篇(第2版)
- Developing Applications with Salesforce Chatter