官术网_书友最值得收藏!

Gathering version info

When Nmap runs a port scan, it retrieves the port info (open/closed/filtered) and then gives us the default service that is running on that port. As one can run any service on any port, that may not be adequate information. If our attack requires a particular service on a particular port, gathering the default information may not be enough. We need to know what service is actually running on that port, not the default service. For instance, knowing that port 80 is open and running HTTP is good to know, but if our attack is specific to Apache, and the target has Microsoft's IIS running on that port, it won't work. We often need the service on the port.

Nmap has a feature that interrogates the service running on each port scanned. It can be used with the -sV switch. Type nmap -sV 192.168.10.70:

Note that, in the output we received, the server is running an older version of IIS on port 80. That makes a tempting target!

主站蜘蛛池模板: 青岛市| 惠州市| 红河县| 谷城县| 都江堰市| 商城县| 兴国县| 明溪县| 华安县| 金寨县| 延吉市| 盱眙县| 大化| 吉首市| 奉新县| 车致| 怀化市| 喀喇沁旗| 尉犁县| 宿迁市| 南汇区| 乌什县| 邵阳市| 闽清县| 迁西县| 双桥区| 海安县| 陆川县| 徐水县| 襄城县| 开阳县| 蒲城县| 五原县| 红安县| 蒲江县| 青浦区| 武冈市| 砚山县| 洪雅县| 伊川县| 罗山县|