Originally posted by Helios
... Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.
I'll leave it to you to work out the connection between ports and services. I'm sure you can manage it, being such an expert haxor and all.

Comment