UsefulLinks
Computer Science
Cybersecurity
Nmap and Network Scanning
1. Fundamentals of Network Communication
2. Introduction to Network Scanning
3. Nmap Fundamentals
4. Host Discovery
5. Core Port Scanning Techniques
6. Service and Version Detection
7. Operating System Detection
8. Advanced Scanning Techniques
9. Timing and Performance Optimization
10. Firewall and IDS Evasion
11. Nmap Scripting Engine (NSE)
12. Output Formats and Analysis
13. Practical Scanning Scenarios
14. Defensive Countermeasures
6.
Service and Version Detection
6.1.
Importance of Service Enumeration
6.1.1.
Service Identification
6.1.1.1.
Running Applications
6.1.1.2.
Service Versions
6.1.2.
Security Assessment
6.1.2.1.
Vulnerability Mapping
6.1.2.2.
Configuration Analysis
6.1.3.
Network Documentation
6.1.3.1.
Service Inventory
6.1.3.2.
Asset Management
6.2.
Version Detection (-sV)
6.2.1.
Service Version Probing
6.2.2.
Banner Grabbing Integration
6.3.
Version Detection Process
6.3.1.
Initial Port Scan
6.3.2.
Service Probing
6.3.3.
Response Analysis
6.3.4.
Version Matching
6.4.
Service Detection Database
6.4.1.
nmap-service-probes File
6.4.2.
Probe Definitions
6.4.3.
Match Patterns
6.4.4.
Service Signatures
6.5.
Version Intensity Control
6.5.1.
--version-intensity Levels
6.5.1.1.
Level 0 (Light)
6.5.1.2.
Level 9 (Comprehensive)
6.5.2.
Intensity Trade-offs
6.5.2.1.
Speed vs Accuracy
6.5.2.2.
Stealth vs Thoroughness
6.6.
Version Detection Techniques
6.6.1.
NULL Probe
6.6.2.
Generic Probes
6.6.3.
Specific Service Probes
6.6.4.
SSL/TLS Probing
6.7.
Service Tunneling Detection
6.7.1.
SSL-Wrapped Services
6.7.2.
SSH Tunneling
6.7.3.
HTTP Tunneling
6.8.
RPC Service Scanning (-sR)
6.8.1.
RPC Program Identification
6.8.2.
Portmapper Queries
6.8.3.
RPC Version Detection
6.9.
Version Detection Output
6.9.1.
Service Names
6.9.2.
Version Numbers
6.9.3.
Product Information
6.9.4.
Additional Details
6.9.5.
CPE Identifiers
Previous
5. Core Port Scanning Techniques
Go to top
Next
7. Operating System Detection