Re: Strange response from network

From: David Coppa (caff@openbeer.it)
Date: Thu Sep 16 2004 - 08:09:58 EDT


* Ben Timby (asp@webexc.com) wrote:

> Nmap simply uses the common ports database
> to guess what service generally resides at the open port it found. For
> instance, if I ran my FTP server on port 22, nmap would detect it as an
> SSH server. I think there is a switch to have it grab the banner for
> you, but I have not used this feature.

nmap -sV host

Best regards,

-- 
David "caff" Coppa <caff AT openbeer DOT it>
OpenBSD: enforcing your security policy from VAX to i386
-- 
------------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
-------------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:05 EDT