- Applied Network Security
- Arthur Salmon Warun Levesque Michael McLafferty
- 171字
- 2021-07-02 23:31:01
Gathering version info
When Nmap runs a port scan, it retrieves the port info (open/closed/filtered) and then gives us the default service that is running on that port. As one can run any service on any port, that may not be adequate information. If our attack requires a particular service on a particular port, gathering the default information may not be enough. We need to know what service is actually running on that port, not the default service. For instance, knowing that port 80 is open and running HTTP is good to know, but if our attack is specific to Apache, and the target has Microsoft's IIS running on that port, it won't work. We often need the service on the port.
Nmap has a feature that interrogates the service running on each port scanned. It can be used with the -sV switch. Type nmap -sV 192.168.10.70:

Note that, in the output we received, the server is running an older version of IIS on port 80. That makes a tempting target!
- API安全實(shí)戰(zhàn)
- 為你護(hù)航:網(wǎng)絡(luò)空間安全科普讀本(第2版)
- 黑客攻防技巧
- Wireshark 2 Quick Start Guide
- 開(kāi)發(fā)者的Web安全戒律:真實(shí)威脅與防御實(shí)踐
- 安全實(shí)戰(zhàn)之滲透測(cè)試
- 網(wǎng)絡(luò)安全三十六計(jì):人人該懂的防黑客技巧
- 云原生安全與DevOps保障
- 人工智能安全(精裝版)
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- CTF快速上手:PicoCTF真題解析(Web篇)
- 計(jì)算機(jī)網(wǎng)絡(luò)安全實(shí)驗(yàn)指導(dǎo)
- 信息系統(tǒng)安全等級(jí)化保護(hù)原理與實(shí)踐
- 聯(lián)邦學(xué)習(xí)原理與算法
- 網(wǎng)絡(luò)安全監(jiān)控實(shí)戰(zhàn):深入理解事件檢測(cè)與響應(yīng)