Banner grabbing with Dmitry
Dmitry is a simple yet streamlined tool that can be used to connect to network services running on remote ports. This specific recipe will demonstrate how to use Dmitry scanning to acquire service banners in order to identify the services associated with open ports on a target system.
Getting ready
To use Dmitry to gather service banners, you will need to have a remote system running network services that discloses information when a client device connects to them. In the examples provided, an instance of Metasploitable2 is used to perform this task. For more information on setting up Metasploitable2, please refer to the Installing Metasploitable2 recipe in Chapter 1, Getting Started.
How to do it…
As was previously discussed in the port scanning recipes of this book, Dmitry can be used to run a quick TCP port scan on 150 of the most commonly used services. This can be done using the -p
option:
root@KaliLinux:~# dmitry -p 172.16.36.135 Deepmagic Information...