Editing Banner Grabbing
Jump to navigation
Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 3: | Line 3: | ||
This is the most popular type of banner grabbing, basically the act of sending packets to the remote host and waiting for their response to analyze the data. | This is the most popular type of banner grabbing, basically the act of sending packets to the remote host and waiting for their response to analyze the data. | ||
− | Active banner grabbing techniques involve opening a | + | Active banner grabbing techniques involve opening a TCP (or similar) connection between an origin host and a remote host. It can be considered active, as your connection will be logged in the remote system. This is the most risky approach to banner grabbing as it’s often detected by some IDS. |
===Passive banner grabbing=== | ===Passive banner grabbing=== |
Advertising: