Page 1086 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1086

Port scanners, network vulnerability scanners, and web

                  vulnerability scanners use a technique called banner grabbing to
                  identify the variant and version of a service running on a system.
                  This technique opens a connection to the service and reads the

                  details provided on the welcome screen, or banner, to assist with
                  version fingerprinting.



               An attacker reading these results would probably make a few
               observations about the system that would lead to some further
               probing:

                    Pointing a web browser at this server would likely give a good idea
                    of what the server does and who operates it. Simply typing
                    http://52.4.85.159 in the address bar of the browser may reveal
                    useful information. Figure 15.2 shows the result of performing this:

                    the site is running a default installation of the Apache web server.

                    Connections to this server are unencrypted. Eavesdropping on
                    those connections, if possible, may reveal sensitive information.

                    The open SSH port is an interesting finding. An attacker may try to
                    conduct a brute-force password attack against administrative
                    accounts on that port to gain access to the system.
   1081   1082   1083   1084   1085   1086   1087   1088   1089   1090   1091