

We can even use it to grab the banner of a web server, which usually runs on port 80. We can do the same for SSH, running on port 22: ~# telnet 10.10.0.50 22 We can use telnet to get version information for FTP, which runs on port 21: ~# telnet 10.10.0.50 21 The syntax is telnet, followed by the IP address of the machine you wish to connect to, followed by the port number.


This unassuming little utility might not seem very useful when it comes to penetration testing, but its value lies in the fact that it's present on virtually any system. The first tool we'll use to do some banner grabbing is telnet. Nmap done: 1 IP address (1 host up) scanned in 0.32 seconds Method 1: Telnet In a terminal window, let's do a quick Nmap scan on the target to see what's running: ~# nmap 10.10.0.50 To learn about banner grabbing, we will be using Metasploitable 2 as the target and Kali Linux as our local machine.
