Editing Banner Grabbing

Jump to navigation Jump to search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.

Latest revision Your text
Line 3: Line 3:
 
This is the most popular type of banner grabbing, basically the act of sending packets to the remote host and waiting for their response to analyze the data.
 
This is the most popular type of banner grabbing, basically the act of sending packets to the remote host and waiting for their response to analyze the data.
  
Active banner grabbing techniques involve opening a [[TCP]] (or similar) connection between an origin host and a remote host. It can be considered active, as your connection will be logged in the remote system. This is the most risky approach to banner grabbing as it’s often detected by some [[IDS]].
+
Active banner grabbing techniques involve opening a TCP (or similar) connection between an origin host and a remote host. It can be considered active, as your connection will be logged in the remote system. This is the most risky approach to banner grabbing as it’s often detected by some IDS.
  
 
===Passive banner grabbing===
 
===Passive banner grabbing===
 
On the other hand, passive banner grabbing enables you to get the same information while avoiding a high level of exposure from the origin connection. Different intermediate software and platforms can be used as a gateway to avoid a direct connection and still allow you to obtain the data you need.
 
On the other hand, passive banner grabbing enables you to get the same information while avoiding a high level of exposure from the origin connection. Different intermediate software and platforms can be used as a gateway to avoid a direct connection and still allow you to obtain the data you need.
  
Using 3rd party networks tools or services such as [[search engines]], [[shodan.io]], or sniffing the traffic to capture and analyze packets, can help you determine software versions.
+
Using 3rd party networks tools or services such as search engines, Shodan, or sniffing the traffic to capture and analyze packets, can help you determine software versions.
 
 
==Banner Grabbing Tools==
 
 
 
===Telnet or netcat===
 
 
 
[[Telnet]] or [[netcat]] allow basic information collection
 
 
 
<code>telnet IP PORT</code>
 
 
 
===Wget===
 
 
 
[[Wget]] is another great tool that can lead us to the remote banner of any remote or local server'
 
 
 
Example:
 
 
 
<code>wget 192.168.0.15 -q -S</code>
 
 
 
The -q will suppress the normal output, and the -S parameter will print the headers sent by the HTTP server or [[FTP]] servers.
 
 
 
===cURL===
 
 
 
[[cURL]] offers the same features to fetch remote banner information from HTTP servers.
 
 
 
<code> curl -s -I 192.168.0.15 | grep -e "Server: "</code>
 
 
 
===Nmap===
 
 
 
[[Nmap]]
 
 
 
<code>[[nmap -sV]] --version-intensity 5 xxxxxx.com -p 80</code>
 
 
 
The -sV option lets us fetch the software versions, and by adding --version-intensity 5, we can get the maximum number of possible details about the remote running software.
 
 
 
By using the powerful nmap [[NSE]] capabilities we can also try other scripts that will help us fetch remote banners easily:
 
 
 
<code>nmap -sV --script=banner IP</code>
 
 
 
===Netcat===
 
 
 
[[Netcat]] is the swiss army knife of the hackers. Netcat is used for file (exploit) transfer, finding open ports & remote administration (Bind & Reverse Shells). You can manually connect to any network service like HTTP using netcat. Another utility is to listen on any udp/tcp ports on your machine for any incoming connections.
 
 
 
<code><nc<IPaddress or FQDN> <port number></code>
 
 
 
==See also==
 
*{{Security}}
 
*[[Certified Ethical Hacker (CEH) Contents]]
 
 
 
[[Category:Security]]
 

Please note that all contributions to wikieduonline may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see Wikieduonline:Copyrights for details). Do not submit copyrighted work without permission!

Cancel Editing help (opens in new window)

Template used on this page:

Advertising: