What did the hacker accomplish?

An attacker tries to do banner grabbing on a remote web server and executes the following command.
$ nmap -sV host.domain.com -p 80
He gets the following output.
Starting Nmap 6.47 ( http://nmap.org ) at 2014-12-08 19:10 EST
Nmap scan report for host.domain.com (108.61.158.211)
Host is up (0.032s latency).
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd
Service detection performed. Please report any incorrect results at http://nmap.org/submit/.Nmap done: 1 IP address (1 host up) scanned in 6.42 seconds
What did the hacker accomplish?

An attacker tries to do banner grabbing on a remote web server and executes the following command.
$ nmap -sV host.domain.com -p 80
He gets the following output.
Starting Nmap 6.47 ( http://nmap.org ) at 2014-12-08 19:10 EST
Nmap scan report for host.domain.com (108.61.158.211)
Host is up (0.032s latency).
PORT STATE SERVICE VERSION
80/tcp open http Apache httpd
Service detection performed. Please report any incorrect results at http://nmap.org/submit/.Nmap done: 1 IP address (1 host up) scanned in 6.42 seconds
What did the hacker accomplish?

A.
nmap can’t retrieve the version number of any running remote service.

B.
The hacker successfully completed the banner grabbing.

C.
The hacker should’ve used nmap -O host.domain.com.

D.
The hacker failed to do banner grabbing as he didn’t get the version of the Apache web server.



Leave a Reply 2

Your email address will not be published. Required fields are marked *


hung

hung

I don’t see the version number? why could it be successful?

JB

JB

The answer is C.

There was no version number revealed. Using -O will reveal more useful information with respect to Banner Grabbing.