Book Image

KALI LINUX NETWORK SCANNING COOKBOOK

Book Image

KALI LINUX NETWORK SCANNING COOKBOOK

Overview of this book

Table of Contents (16 chapters)
Kali Linux Network Scanning Cookbook
Credits
About the Author
About the Reviewers
www.PacktPub.com
Disclaimer
Preface
Index

Service identification with Nmap


Although banner grabbing can be an extremely lucrative source of information at times, version disclosure in service banners is becoming less common. Nmap has a service identification function that goes far beyond simple banner grabbing techniques. This specific recipe will demonstrate how to use Nmap to perform service identification based on probe-response analysis.

Getting ready

To use Nmap to perform service identification, you will need to have a remote system that is running network services that can be probed and inspected. In the examples provided, an instance of Metasploitable2 is used to perform this task. For more information on setting up Metasploitable2, please refer to the Installing Metasploitable2 recipe in Chapter 1, Getting Started.

How to do it…

To understand the effectiveness of Nmap's service identification function, we should consider a service that does not provide a self-disclosed service banner. By using Netcat to connect to TCP port...