In this recipe, we will look at how to analyze the open port to determine what kind of service(s) are running on the open port(s). This will help us understand if the target IP is running any vulnerable software. That is why service fingerprinting is a necessary and a very important step.
We will use nmap to fingerprint the services of the target IP. Nmap is a multi-functional tool that performs jobs ranging from host discovery to vulnerability assessment; service fingerprinting is also a part of it.
The steps are as follows:
nmap -sV <IP address>
The output will be as shown in the following screenshot: