Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 8, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 8, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 8, 2025

      AI is currently in its teenage years, battling raging hormones

      June 6, 2025

      The 2025 Wholesome Direct was chock-full of cozy casual games and aesthetic vibes

      June 8, 2025

      All known AMD Ryzen Z2 Series gaming handheld chips and how they are rumored to compare

      June 8, 2025

      “The original Mass Effect trilogy was absolutely an inspiration.” The RPG experts behind WH40K: Rogue Trader are hitting it big with ‘The Expanse: Osiris Reborn’

      June 8, 2025

      If you’ve started to notice Xbox console games showing up on the Xbox PC store, you’re not alone — what’s going on?

      June 8, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Master Image Processing in Node.js Using Sharp for Fast Web Apps

      June 7, 2025
      Recent

      Master Image Processing in Node.js Using Sharp for Fast Web Apps

      June 7, 2025

      mkocansey/bladewind

      June 7, 2025

      Handling PostgreSQL Migrations in Node.js

      June 6, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      The 2025 Wholesome Direct was chock-full of cozy casual games and aesthetic vibes

      June 8, 2025
      Recent

      The 2025 Wholesome Direct was chock-full of cozy casual games and aesthetic vibes

      June 8, 2025

      All known AMD Ryzen Z2 Series gaming handheld chips and how they are rumored to compare

      June 8, 2025

      “The original Mass Effect trilogy was absolutely an inspiration.” The RPG experts behind WH40K: Rogue Trader are hitting it big with ‘The Expanse: Osiris Reborn’

      June 8, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Learning Resources»Amap – Gather Info in Easy Way

    Amap – Gather Info in Easy Way

    June 6, 2025

    Amap is an application mapping tool that we can use to read banners from network services running on remote ports. In our this detailed article we are going to learn hot we can use Amap on Kali Linux to acquire service banners in order to identify the services running with open ports on a target system. This is a very good information gathering tool for cybersecurity.

    amap on Kali Linux

    To use Amap to gather service banners, we will need to have a remote system running network services that discloses information when a client device connects to them. In our article we are going to use a Metasploitable2 instance for example. We already have an article about installing Metasploitable2.

    Amap is comes preloaded with our Kali Linux system so we don’t need to install it on our system, we can directly run the following command on our terminal to see the help/options of Amap:

    amap --h

    The output of command shown in the following screenshot:

    amap help options on Kali Linux

    In the above screenshot we can see that -B flag in Amap can be used to run Amap in banner mode. This have it collect banners for the specified IP and service port(s). This application can be used to collect the banner from a single service by specifying the remote IP address and port number.

    For an example we run following command on our terminal:

    amap -B 172.20.10.10 21

    This command will scan our Metaspoitable2 IP to grab the banner of port 21. The result shown in the following screenshot:

    banner garbbing on port 21 using amap

    On the above screenshot, we can see that Amap has grabbed the service banner from port 21 on the Metasploitable2 system. We can also run this command to perform a scan of all the possible TCP ports, all the possible ports must need to scanned. The portions of the TCP headers that define the source & destination port address are both 16 bits in length, also each bit can retain a value of 1 or 0. So there are 216 or 65536 possible TCP port addresses. To scan all the TCP ports all we need to specify the range of 1 to 65535. We can do this by using following command on our terminal:

    amap -B 172.20.10.10 1-65535

    In the following screenshot we can see the output of the applied command.

    amap banner grabbing of all ports

    In the above screenshot we can see that we got the opened ports and their banners. Sometimes the normal output of the command shows lots of unnecessary & redundant information that can be extracted from the output. Like the IP address & metadata is there without any logic. We can filter the output using following command:

    amap -B 172.20.10.10 1-65535 | grep "on" | cut -d ":" -f 2-5

    Now in the following screenshot we can see that the output is to the point.

    filtered output of amap

    This shows the principal that tells how Amap can accomplish the task of banner grabbing is same as some other tools like Nmap. Amap cycles through the list of destination port address, attempts to establish a connection with each port, and then receives every returned banner that is sent upon connection to the service running on the port.

    Love our articles? Stay updated with our articles by following us on Twitter and GitHub. Be a part of the KaliLinuxIn community by joining our Telegram Group, where we focus on Linux and Cybersecurity. We’re always available to help in the comment section and read every comment, ensuring a prompt reply.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleBest USB WiFi Adapter For Kali Linux 2025 [Updated March]
    Next Article Spf Permerror Troubleshooting Guide For Better Email Deliverability Today

    Related Posts

    News & Updates

    The 2025 Wholesome Direct was chock-full of cozy casual games and aesthetic vibes

    June 8, 2025
    News & Updates

    All known AMD Ryzen Z2 Series gaming handheld chips and how they are rumored to compare

    June 8, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Windows 11 File Explorer gets better theme accent support, progress bar looks darker

    Operating Systems

    CVE-2025-5543 – TOTOLINK X2000R Cross-Site Scripting Vulnerability in Parent Controls Page

    Common Vulnerabilities and Exposures (CVEs)

    Threat Actors Actively Exploiting Critical vBulletin Vulnerability in the Wild

    Security

    CVE-2025-4770 – PHPGurukul Park Ticketing Management System SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    News & Updates

    I got my hands on Lenovo’s new dual-screen OLED laptop — I can already see how the redesign makes it better than ever

    May 26, 2025

    Lenovo’s refreshed Yoga Book 9i (Gen 10) just showed up on my doorstep. I’m giving…

    SpyNote, BadBazaar, MOONSHINE Malware Target Android and iOS Users via Fake Apps

    SpyNote, BadBazaar, MOONSHINE Malware Target Android and iOS Users via Fake Apps

    April 11, 2025

    How Attackers Target Travelers – and How to Defend Yourself

    May 29, 2025

    This AI Paper Introduces LLaDA-V: A Purely Diffusion-Based Multimodal Large Language Model for Visual Instruction Tuning and Multimodal Reasoning

    June 3, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.