3 Discovering network services
This chapter covers
- Understanding network services from an attacker’s perspective
- Network service discovery using Nmap
- Organizing and sorting Nmap scan output
- Creating protocol-specific target lists for vulnerability discovery
In the last chapter, you learned that the information-gathering phase is broken into three separate sub-phases:
-
Host discovery
-
Service discovery
-
Vulnerability discovery
You should be finished with the first sub-phase already. If you haven’t done host discovery against your target environment yet, go back and complete chapter 2 before continuing. In this chapter, you learn how to execute the second sub-phase: service discovery. During service discovery, your goal is to identify ...
Get The Art of Network Penetration Testing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.