Banner grabbing with Amap
Amap is an application-mapping tool that can be used to read banners from network services running on remote ports. This specific recipe will demonstrate how to use Amap to acquire service banners in order to identify the services associated with open ports on a target system.
Getting ready
To use Amap to gather service banners, you will need to have a remote system running network services that discloses information when a client device connects to them. In the examples provided, an instance of Metasploitable2 is used to perform this task. For more information on setting up Metasploitable2, please refer to the Installing Metasploitable2 recipe in Chapter 1, Getting Started.
How to do it…
The -B
option in Amap can be used to run the application in banner mode. This will have it collect banners for the specified IP address and service port(s). Amap can be used to collect the banner from a single service by specifying the remote IP address and service number:
root@KaliLinux...