#### LAB 4: Remote Grabbing to Determine a Remote Target System using telnet and netcat Telnet is a connection utility but we are going to sue it to identify the make, model and version of any website's software and even other services like SSH ## Lab Scenario In the previous lab, you learned to use Nmap to achieve most of what we'll do here with telnet but Nmap is noisy and you want to work stealthily. As a penertation tester, it is extremely important for penetration testers to be familiar with banner grabbing techniques to monitor servers to ensure compliance and appropriate security updates. ## Lab Objectives * Identify the domain IP address * Identify the domain information ## Lab Environment Your lab machine hostX.ws.nsrc.org If you do not have telnet and netcat, kindly install by executing: sudo apt-get install telnet netcat ## Lab Duration 5 minutes ## Lab Tasks telnet hostX.ws.nsrc.org 80 nc -vv hostX.ws.nsrc.org 80 > Analyze the resulting output > You can prevent this by editing your apache banner for example telnet hostX.ws.nsrc.org 22 nc -vv hostX.ws.nsrc.org 22