6 Banner Grabbing Tools with Examples [100% Working] | GoLinuxCloud (2024)

What is Banner Grabbing

While doing reconnaissance on a target, we may use some of the information regarding our target which is readily available. In banner grabbing, penetration testers will look for banner information displayed while interacting with the target. Information contained in these banners may be of great use to the penetration testers while launching attacks on the target. Some of the information we can find out through banner grabbing include; the name of the software being used, the version of the software, and even the operating system that is used by the target.

In banner grabbing, penetration testers can easily find out the vulnerabilities related to the target by checking the information relating to software against a database of known vulnerabilities. Banner grabbing can be divided into two main types

Types of banner grabbing

Passive banner grabbing

In the passive method, the penetration tester does not interact with the target server. A third party software is deployed hence the pentester is not connected directly to the target. Penetration testers will use this software to analyze the packets received from the target server to get the information relating to the server. Intrusion detection systems hardly detect passive banner grabbing. There are also websites that can be used in passive banner grabbing such as Shodan.

Active banner grabbing

Active banner grabbing requires the penetration tester to send and analyze captured packets without the use of a “proxy” software. This type of banner grabbing is easily detected by the intrusion detection system since the penetration tester has to have a connection with the target server.

ALSO READL3MON - Hack Android Mobile Remotely [Step-by-Step]

Requirements

  1. Have a running instance of Kali Linux
  2. Have a target server (In this guide we will be using Metasploitable)
  3. Knowledge of using the terminal

In this guide, I will guide you on how to use various tools to perform banner grabbing on aMetasploitable server.

Banner grabbing using various tools

Nmap

Various techniques can be employed while using Nmap for banner grabbing. These techniques are used depending on the type of information the penetration tester intends to obtain from the scan. We will use various methods to collect information related to our target metasploitable server.

To acquire information relating to a server on Nmap, we will scan a specific port running a service on the target server. We can include various flags to obtain detailed information.

Nmap has a script “banner” to help a user while performing banner grabbing. In our case, we want to obtain information relating to services running on port 22 of our target server. To use the script we will add -script=banneron our command as shown below.

nmap -p 22 --script=banner 172.17.0.2

6 Banner Grabbing Tools with Examples [100% Working] | GoLinuxCloud (1)

In advanced scanning, we can add more flags to help gather even more information relating to the target server. We can add an -sV flag to help us determine the software version that is being run as shown in the image below.

6 Banner Grabbing Tools with Examples [100% Working] | GoLinuxCloud (2)

We can also increase or decrease the number of probes to use when detecting the software version by changing the intensity level of the scan with the argument, --version-intensity [0-9], just after -sV flag. This Nmap option is incredibly effective against services running on non default ports due to changes in the configuration.

ALSO READInstall Airmon-ng Kali Linux [2 Methods with Examples]

6 Banner Grabbing Tools with Examples [100% Working] | GoLinuxCloud (3)

Nmap also allows us to scan for common ports by default. To use these options we just need to run a scan without specifying the target port. This will scan and return all the information related to the ports found as shown in the image below.

6 Banner Grabbing Tools with Examples [100% Working] | GoLinuxCloud (4)

Dmitry

Deepmagic Information Gathering Tool can also be used for banner grabbing. Dmitry is a tool used by penetration testers to gather all the possible information related to a target domain. With Dmitry’s base functionality a penetration tester can be able to gather the following information related to a target host; email addresses, open ports, possible target subdomains e.t.c. To use Dmitry for banner grabbing, we will be adding -pb flag. This flag helps a penetration tester to gather the banners for all the target hosts' open ports.

6 Banner Grabbing Tools with Examples [100% Working] | GoLinuxCloud (5)

Netcat

This is a network utility tool that can be used by penetration testers to grab an FTP banner for our target. To get the banner information on Netcat we simply run the command

nc <target> <port>

Since we are using netcat for the FTP banner, we will use the FTP port which is 21 as shown in the image below.

6 Banner Grabbing Tools with Examples [100% Working] | GoLinuxCloud (6)

As you can see in the image above, our target is using version 2.3.4.

Nikto

Nikto is another tool that can be used for banner grabbing. It is an open source web application scanner. To capture details about the installed web server version, and configuration files among other useful information. To grab banners related to a target web server, we will run the below command.

nikto -h <target>

6 Banner Grabbing Tools with Examples [100% Working] | GoLinuxCloud (7)

ALSO READNettacker - Automated Pentesting Framework [Tutorial]

Wget

Wget is a command-line utility for downloading files from the web. The tool can be used to get banners from a target server. To use wget we will run the command shown below.

wget -q -S <target>

-q suppresses normal output while -Sflag will show the headers that have been sent by the target.

6 Banner Grabbing Tools with Examples [100% Working] | GoLinuxCloud (8)

cURL

This is a command line interphase tool that a user can use to transfer data, using the libcurl library, from a remote server without the need for user interaction. cURL also can retrieve banner details of HTTP servers. To use it for banner grabbing, we simply run the command

curl -s -I <target>

In the above command, we have added 2 flags to ensure the effectiveness of cURL while fetching banner information. -s is used to suppress error messages being displayed and -I is to print the header information we are fetching.

6 Banner Grabbing Tools with Examples [100% Working] | GoLinuxCloud (9)

Conclusion

In the information gathering stage of penetration testing, banner grabbing is very useful as it helps the penetration testers to have knowledge of the target’s software versions. This will later serve as a starting point when looking for vulnerabilities within the target system. There are numerous tools we can use for banner grabbing during the reconnaissance stage depending on the type of banner grabbing you want to use. i.e. Active or passive banner grabbing. With the help of this guide, you can be able to perform banner grabbing on the target server for common services that are running on a target server.

Views: 508

Can't find what you're searching for? Let us assist you.

Enter your query below, and we'll provide instant results tailored to your needs.

6 Banner Grabbing Tools with Examples [100% Working] | GoLinuxCloud (2024)

References

Top Articles
Tongue Problems: Types, Symptoms and Treatment
Tongue Problem Basics
Devotion Showtimes Near Xscape Theatres Blankenbaker 16
Skyward Sinton
Main Moon Ilion Menu
What is Mercantilism?
Fully Enclosed IP20 Interface Modules To Ensure Safety In Industrial Environment
Craigslist Pet Phoenix
Dark Souls 2 Soft Cap
Craigslist Boats For Sale Seattle
Builders Best Do It Center
Uhcs Patient Wallet
Lax Arrivals Volaris
Conan Exiles Colored Crystal
Navy Female Prt Standards 30 34
Craigslist In Flagstaff
Free Online Games on CrazyGames | Play Now!
Ally Joann
Cta Bus Tracker 77
Airrack hiring Associate Producer in Los Angeles, CA | LinkedIn
eHerkenning (eID) | KPN Zakelijk
Dtlr Duke St
Bethel Eportal
Dark Entreaty Ffxiv
Sister Souljah Net Worth
Airline Reception Meaning
Inter Miami Vs Fc Dallas Total Sportek
Preggophili
R Baldurs Gate 3
Pokémon Unbound Starters
49S Results Coral
Baddies Only .Tv
MethStreams Live | BoxingStreams
Play 1v1 LOL 66 EZ → UNBLOCKED on 66games.io
Gas Prices In Henderson Kentucky
Mp4Mania.net1
Pitco Foods San Leandro
Colorado Parks And Wildlife Reissue List
Build-A-Team: Putting together the best Cathedral basketball team
D3 Boards
My.lifeway.come/Redeem
9781644854013
Levothyroxine Ati Template
Sept Month Weather
How to Print Tables in R with Examples Using table()
Ds Cuts Saugus
15 Best Places to Visit in the Northeast During Summer
Amy Zais Obituary
House For Sale On Trulia
Mkvcinemas Movies Free Download
All Obituaries | Roberts Funeral Home | Logan OH funeral home and cremation
Equinox Great Neck Class Schedule
Latest Posts
Article information

Author: Moshe Kshlerin

Last Updated:

Views: 6296

Rating: 4.7 / 5 (77 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Moshe Kshlerin

Birthday: 1994-01-25

Address: Suite 609 315 Lupita Unions, Ronnieburgh, MI 62697

Phone: +2424755286529

Job: District Education Designer

Hobby: Yoga, Gunsmithing, Singing, 3D printing, Nordic skating, Soapmaking, Juggling

Introduction: My name is Moshe Kshlerin, I am a gleaming, attractive, outstanding, pleasant, delightful, outstanding, famous person who loves writing and wants to share my knowledge and understanding with you.