ve the command line for using TheHarvester to search LinkedIn for the ws.edu domain. What type of scan does “nmap -sS scanme.nmap.org” do? How many ports are scanned? Much ado is made about Banner Broadcasting and you have lab on how to delete IIS banners. What information do banners potentially leak t

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Give the command line for using TheHarvester to search LinkedIn for the ws.edu domain.

What type of scan does “nmap -sS scanme.nmap.org” do? How many ports are scanned?

Much ado is made about Banner Broadcasting and you have lab on how to delete IIS banners. What information do banners potentially leak to outsiders?

Expert Solution
Step 1

Introduction:

TheHarvester is a tool that can be used for reconnaissance purposes, so it's important to be aware of the legal and ethical implications of using such tools. It's also important to use TheHarvester responsibly and only target domains for which you have permission.

The command nmap -sS scanme.nmap.org performs a TCP SYN scan using Nmap

 

Banner broadcasting is the practice of sending detailed information about the software and version running on a network service to clients that connect to the service. This information is usually displayed in the banner that is displayed when a client connects to a service.

Banners can contain sensitive information that could be used by attackers to identify known vulnerabilities in the software and target the system for the attack. This information can include the operating system and version, web server software and version, and application software and version.

To reduce the amount of information disclosed to potential attackers, it is a best practice to remove or obscure the information contained in banners. This can be done by modifying the software configuration or using security tools such as firewalls or intrusion detection systems to block or remove the banner information.

It is important to keep in mind that while removing or obscuring banners can help to reduce the information disclosed to attackers, it is just one aspect of securing a network system. There are many other steps you can take to secure your network and protect it from attack.

trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 4 steps

Blurred answer
Knowledge Booster
Form and its Elements
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education