web server
-
An attacker tries to do banner grabbing on a remote web server and executes the following command:
$ nmap -sV hackme.com -p 80He gets the following output:
Starting Nmap 7.90 ( http://nmap.org ) at 2020-09-26 22:47 EST
Nmap scan report for hackme.com (108.58.137.114)
Host is up (0.048s latency).
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd
Service detection performed. Please report any incorrect results at http://nmap.org/submit/.Nmap done: 1 IP address (1 host up) scanned in 7.36 secondsWhat did the hacker accomplish?
nmap can’t retrieve the version number of any running remote service.
The hacker successfully completed the banner grabbing.
The hacker should have used nmap -O host.domain.com.
The hacker failed to do banner grabbing as he didn’t get the version of the Apache web server.
Step by step
Solved in 2 steps