How to do it...

Let's use Nmap NSE to get the banner information:

  1. Nmap NSE scripts can be called using the --script option in Nmap and then specifying the name of the desired script. For this particular script, a -sT full-connect scan should be used, as service banners can only be collected when a full TCP connection is established. The script will be applied to the same ports that are scanned by the Nmap request:
  1. In the example provided, the TCP port 22 of the Metasploitable2 system was scanned. In addition to indicating that the port is open, Nmap also used the banner script to collect the service banner associated with that port. This same technique can be applied to a sequential range of ports using the -- notation:
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset