Editing Banner Grabbing
Jump to navigation
Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 12: | Line 12: | ||
==Banner Grabbing Tools== | ==Banner Grabbing Tools== | ||
− | ===Telnet | + | ===Telnet=== |
− | [[Telnet]] | + | One of the most famous is [[Telnet]] |
<code>telnet IP PORT</code> | <code>telnet IP PORT</code> | ||
Line 26: | Line 26: | ||
<code>wget 192.168.0.15 -q -S</code> | <code>wget 192.168.0.15 -q -S</code> | ||
− | The -q will suppress the normal output, and the -S parameter will print the headers sent by the HTTP server | + | The -q will suppress the normal output, and the -S parameter will print the headers sent by the HTTP server, which also works for FTP servers. |
===cURL=== | ===cURL=== | ||
Line 38: | Line 38: | ||
[[Nmap]] | [[Nmap]] | ||
− | <code> | + | <code>nmap -sV --version-intensity 5 xxxxxx.com -p 80</code> |
− | The -sV option lets us fetch the software versions, and by adding | + | The -sV option lets us fetch the software versions, and by adding –version-intensity 5, we can get the maximum number of possible details about the remote running software. |
− | By using the powerful | + | By using the powerful NSE we can also try other scripts that will help us fetch remote banners easily: |
<code>nmap -sV --script=banner IP</code> | <code>nmap -sV --script=banner IP</code> |
Advertising: