githubEdit

Banner Grabbing

Telnet Banner Grab

telnet 10.10.182.147 80
GET / HTTP/1.0
host: telnet
GET / HTTP/1.1
host: telnet
telnet banner grab

NetCat Banner Grab

When Nmap -sV truncates or omits banner detail: Connect manually with nc and capture with tcpdump. The full banner often arrives in a PSH-ACK segment (Flags [P.]) that Nmap may not display.

In the tcpdump output, look for the Flags [P.] (PSH-ACK) line — it contains the full banner, e.g. 220 inlane ESMTP Postfix (Ubuntu).

NetCat FTP Banner Grab

nc ftp

Openssl banner grab

  • Used when https is open on the host

HTTP Header Grabbing (curl)

Look for:

  • Server: - Web server software/version

  • X-Powered-By: - Backend technology (PHP, Express, etc.)

  • X-Redirect-By: - CMS (e.g., WordPress)

Last updated