Penetration Testing mailing list archives
Re: Strange response from network
From: David Coppa <caff () openbeer it>
Date: Thu, 16 Sep 2004 14:09:58 +0200
* Ben Timby (asp () webexc com) wrote:
Nmap simply uses the common ports database to guess what service generally resides at the open port it found. For instance, if I ran my FTP server on port 22, nmap would detect it as an SSH server. I think there is a switch to have it grab the banner for you, but I have not used this feature.
nmap -sV host Best regards, -- David "caff" Coppa <caff AT openbeer DOT it> OpenBSD: enforcing your security policy from VAX to i386 -- ------------------------------------------------------------------------------ Ethical Hacking at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Check out our Advanced Hacking course, learn to write exploits and attack security infrastructure. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. http://www.infosecinstitute.com/courses/ethical_hacking_training.html -------------------------------------------------------------------------------
Current thread:
- Strange response from network Shashank Rai (Sep 15)
- Re: Strange response from network Ben Timby (Sep 15)
- Re: Strange response from network David Coppa (Sep 16)
- Re: Strange response from network Mambo Dsouza (Sep 16)
- Re: Strange response from network Martin Mačok (Sep 16)
- <Possible follow-ups>
- Re: Strange response from network shashrai (Sep 16)
- Re: Strange response from network shashrai (Sep 16)
- Re: Strange response from network Ben Timby (Sep 15)
