Nmap Version Detection
Version detection provides information on all identified open ports interrogating them using probes that generate specific responses by specific services.
Syntax
Version Detection is used with the -sV
command, and it allows the user to collect information about the port. This can include the version number, the service type, the operating system, the hostname, etc.
nmap -sV <localhost>
The command starts an assessment on <localhost>
.
The command can be customized with the following options:
--allports
--version-intensity
--version-light
--version-all
--version-trace
Example
The following example demonstrates the use of Version Detection using scanme.nmap.org
(a safe test host):
nmap -sV scanme.nmap.org
This outputs:
$ nmap -sV scanme.nmap.orgStarting Nmap 7.80 ( https://nmap.org ) at 2022-12-11 03:37 UTCNmap scan report for scanme.nmap.org (45.33.32.156)Host is up (0.074s latency).Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2fNot shown: 996 closed portsPORT STATE SERVICE VERSION22/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.13 (Ubuntu Linux; protocol 2.0)80/tcp open http Apache httpd 2.4.7 ((Ubuntu))9929/tcp open nping-echo Nping echo31337/tcp open tcpwrappedService Info: OS: Linux; CPE: cpe:/o:linux:linux_kernelService detection performed. Please report any incorrect results at https://nmap.org/submit/ .Nmap done: 1 IP address (1 host up) scanned in 11.82 seconds
Contributors
- Anonymous contributor