The network scanner
In this section, we will look at several tools that can be used to find open ports, fingerprint the remote operating system, and enumerate the services on the remote machine.
Service enumeration is a method that is used to find the service version that is available on a particular port on the target system. This version information is important because with this information, the penetration tester can search for security vulnerabilities that exist for that software version.
Some system administrators often change the port number, a service is listening on. For example, an SSH service may be bound to port
22 (as a convention), but a system administrator may change it to be bound to port
2222. If the penetration tester only does ...