An attacker tries to do
banner grabbing on a remote web server and executes the following command.
$ nmap -sV host.domain.com -p 80
He gets the following output.
Starting Nmap 6.47 (
g ) at 2014-12-08 19:10 EST
Nmap scan report fo
r host.domain.com (108.61.158.211)
Host is up (0.032s latency).
PORT
STATE
SERVICE
VERSION
80/tcp
open
http
Apache httpd
Service detection performed. Please report any incorrect results at
.
Nmap done: 1 IP address (1 host up) scanned in 6.42 seconds
What did the hacker accomplish?
A. nmap cant retrieve the version number of any running remote service.
B. The hacker successfully completed the banner grabbing.
C. The hacker shouldve used
nmap -O host.domain.com.
D. The hacker failed to do banner grabbing as he didnt get the version of the Apache web server.