For example, a Microsoft Exchange e-mail server would only be installed on Windows OS.
What is it used for.?
Mainly to gather information regarding the daemon name, version and the OS information.
We can also use this for security measures detection.
This also helps in identifying the possible points of entry.But this method is very risky.
Countermeasures :
Edit the default welcome message and ensure taht important info is not shown.
Misguide the attacker by displaying false banners.
Use a long false daemon banner and in the background record the info to trace the attacker.
TOOLS:
Netcat (Unix)
Superscan
SamSpade crawler
Nmap Tool
3 comments:
How to display false daemon banner?
Can you please enumerate some tools used for this purpose?
Post a Comment