O'Reilly logo

Kali Linux Network Scanning Cookbook by Justin Hutchens

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Fingerprinting

After identifying live systems on the target range and enumerating open ports on those systems, it is important to start gathering information about them and services that are associated with the open ports. In this chapter, we will discuss different techniques used to fingerprint systems and services with Kali Linux. These techniques will include banner grabbing, service probe identification, operating system identification, SNMP information gathering, and Firewall identification. Specific recipes in this chapter include the following:

  • Banner grabbing with Netcat
  • Banner grabbing with Python sockets
  • Banner grabbing with Dmitry
  • Banner grabbing with Nmap NSE
  • Banner grabbing with Amap
  • Service identification with Nmap
  • Service identification ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required