#### LAB 4: Remote Grabbing to Determine a Remote Target System using telnet and netcat

Telnet is a connection utility but we are going to sue it to identify the make, model and version of any website's software and even other services like SSH

## Lab Scenario

In the previous lab, you learned to use Nmap to achieve most of what we'll do here with telnet but Nmap is noisy and you want to work stealthily.
As a penertation tester, it is extremely important for penetration testers to be familiar with banner grabbing techniques to monitor servers to ensure compliance and appropriate security updates.

## Lab Objectives

* Identify the domain IP address
* Identify the domain information

## Lab Environment

Your lab machine hostX.ws.nsrc.org

If you do not have telnet and netcat, kindly install by executing:

	sudo apt-get install telnet netcat

## Lab Duration

	5 minutes

## Lab Tasks

	telnet hostX.ws.nsrc.org 80
	nc -vv hostX.ws.nsrc.org 80

> Analyze the resulting output
> You can prevent this by editing your apache banner for example
	telnet hostX.ws.nsrc.org 22

	nc -vv hostX.ws.nsrc.org 22