I’m starting the Attacking Enterprise Networks module and am having trouble with the first question:
“Perform a banner grab of the services listening on the target host and find a non-standard service banner. Submit the name as your answer (format: word_word_word)”
Well, first of all all of the ports that return open for the target are for standard services on standard ports, such as pop3 on port 110, rpcbind on port 111 etc. I did an nmap scan with the banner script to return the banners for open ports. Then used the banner grab egrep command from the github cheat sheet but I’m not seeing how these results will help me answer the question.
I don’t want the answer, I just want pushed in the right direction.