The network scanner
In this section, we will look at several tools that can be used to find open ports, fingerprint the remote operating system, and enumerate the services on the remote machine.
Service enumeration is a method that is used to find the service version that is available on a particular port on the target system. This version information is important because with this information, the penetration tester can search for security vulnerabilities that exist for that software version.
Some system administrators often change the port number, a service is listening on. For example, an SSH service may be bound to port 22
(as a convention), but a system administrator may change it to be bound to port 2222
. If the penetration tester only does ...
Get Kali Linux – Assuring Security by Penetration Testing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.