Home page logo

pen-test logo Penetration Testing mailing list archives

Re: Strange response from network
From: David Coppa <caff () openbeer it>
Date: Thu, 16 Sep 2004 14:09:58 +0200

* Ben Timby (asp () webexc com) wrote:

Nmap simply uses the common ports database 
to guess what service generally resides at the open port it found. For 
instance, if I ran my FTP server on port 22, nmap would detect it as an 
SSH server. I think there is a switch to have it grab the banner for 
you, but I have not used this feature.

nmap -sV host

Best regards,
David "caff" Coppa <caff AT openbeer DOT it>

OpenBSD: enforcing your security policy from VAX to i386

Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]