官术网_书友最值得收藏!

Determining active services

The final goal of the enumeration portion of reconnaissance is to identify the services and applications that are operational on the target system. If possible, the attacker would want to know the service type, vendor, and version to facilitate the identification of any vulnerability.

The following are some of the techniques used to determine active services:

  • Identify default ports and services: If the remote system is identified as having a Microsoft operating system with port 80 open (the WWW service), an attacker may assume that a default installation of Microsoft IIS is installed. Additional testing will be used to verify this assumption (nmap).
  • Banner grabbing: This is done using tools such as a map, netcat, nmap, and Telnet.
  • Review default web pages: Some applications install with default administration, error, or other pages. If attackers access these, they will provide guidance on installed applications that may be vulnerable to attack. In the following screenshot, the attacker can easily identify the version of Apache Tomcat that has been installed on the target system.
  • Review source code: Poorly configured web-based applications may respond to certain HTTP requests such as HEAD or OPTIONS with a response that includes the web server software version and, possibly, the base operating system or the scripting environment in use. In the following screenshot, netcat is launched from the command line and is used to send raw HEAD packets to a particular website. This request generates an error message (404 not found); however, it also identifies that the server is running Microsoft IIS, Version 7.5:
主站蜘蛛池模板: 商南县| 剑川县| 新闻| 桐城市| 静海县| 田东县| 津市市| 土默特右旗| 扎兰屯市| 错那县| 望奎县| 理塘县| 垣曲县| 百色市| 深水埗区| 琼海市| 穆棱市| 邮箱| 彭泽县| 竹山县| 东源县| 周至县| 孟连| 苏州市| 会理县| 宣威市| 礼泉县| 巴塘县| 凤庆县| 武邑县| 盖州市| 庆阳市| 延津县| 建阳市| 高台县| 舟曲县| 浏阳市| 武夷山市| 多伦县| 阜城县| 浠水县|