February 2016
Intermediate to advanced
296 pages
6h 9m
English
Nmap is probably the most used port scanner in the world. It can be used to identify live hosts, scan TCP and UDP open ports, detect firewalls, get versions of services running in remote hosts, and even, with the use of scripts, find and exploit vulnerabilities.
In this recipe, we will use Nmap to identify all the services running on our target application's server and their versions. We will do this in several calls to Nmap for learning purposes, but it can be done using a single command.
All we need is to have our vulnerable_vm running.
nmap -sn 192.168.56.102
Read now
Unlock full access