Nmap Version Detection
Anonymous contributor
Anonymous contributor1 total contribution
Anonymous contributor
Published Jan 21, 2023
Contribute to Docs
Version detection provides information on all identified open ports interrogating them using probes that generate specific responses by specific services.
Syntax
Version Detection is used with the -sV
command, and it allows the user to collect information about the port. This can include the version number, the service type, the operating system, the hostname, etc.
nmap -sV <localhost>
The command starts an assessment on <localhost>
.
The command can be customized with the following options:
--allports
--version-intensity
--version-light
--version-all
--version-trace
Example
The following example demonstrates the use of Version Detection using scanme.nmap.org
(a safe test host):
nmap -sV scanme.nmap.org
This outputs:
$ nmap -sV scanme.nmap.orgStarting Nmap 7.80 ( https://nmap.org ) at 2022-12-11 03:37 UTCNmap scan report for scanme.nmap.org (45.33.32.156)Host is up (0.074s latency).Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2fNot shown: 996 closed portsPORT STATE SERVICE VERSION22/tcp open ssh OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.13 (Ubuntu Linux; protocol 2.0)80/tcp open http Apache httpd 2.4.7 ((Ubuntu))9929/tcp open nping-echo Nping echo31337/tcp open tcpwrappedService Info: OS: Linux; CPE: cpe:/o:linux:linux_kernelService detection performed. Please report any incorrect results at https://nmap.org/submit/ .Nmap done: 1 IP address (1 host up) scanned in 11.82 seconds
All contributors
- Anonymous contributorAnonymous contributor1 total contribution
- Anonymous contributor
Looking to contribute?
- Learn more about how to get involved.
- Edit this page on GitHub to fix an error or make an improvement.
- Submit feedback to let us know how we can improve Docs.