Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
0Activity
0 of .
Results for:
No results containing your search query
P. 1
HHS En05 System Identification

HHS En05 System Identification

Ratings: (0)|Views: 8|Likes:
Published by Irwanto Cia
tech
tech

More info:

Published by: Irwanto Cia on Feb 16, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

02/16/2013

pdf

text

original

 
LESSON 5SYSTEM IDENTIFICATION
 
“License for Use” Information
The following lessons and workbooks are open and publicly available under the followingterms and conditions of ISECOM:All works in the Hacker Highschool project are provided for non-commercial use withelementary school students, junior high school students, and high school students whether in apublic institution, private institution, or a part of home-schooling. These materials may not bereproduced for sale in any form. The provision of any class, course, training, or camp withthese materials for which a fee is charged is expressly forbidden without a license includingcollege classes, university classes, trade-school classes, summer or computer camps, andsimilar. To purchase a license, visit the LICENSE section of the Hacker Highschool web page atwww.hackerhighschool.org/license.The HHS Project is a learning tool and as with any learning tool, the instruction is the influenceof the instructor and not the tool. ISECOM cannot accept responsibility for how anyinformation herein is applied or abused.The HHS Project is an open community effort and if you find value in this project, we do ask you support us through the purchase of a license, a donation, or sponsorship.All works copyright ISECOM, 2004.
2
 
 
LESSON 5 – SYSTEM IDENTIFICATION
 
Table of Contents
“License for Use” Information..................................................................................................................2Contributors................................................................................................................................................45.0 Introduction..........................................................................................................................................55.1 Identifying a Server..............................................................................................................................65.1.1 Identifying the Owner of a Domain..........................................................................................65.1.2 Identifying the IP address of a Domain....................................................................................65.2 Identifying Services..............................................................................................................................65.2.1 Ping and TraceRoute...................................................................................................................65.2.2 Banner Grabbing.........................................................................................................................75.2.3 Identifying Services from Ports and Protocols..........................................................................75.3 System Fingerprinting..........................................................................................................................95.3.1 Scanning Remote Computers....................................................................................................9Further Reading........................................................................................................................................12
3
 
LESSON 5 – SYSTEM IDENTIFICATION

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->