General techniques for identifying an unknown service

I have a specific sample I’d like feedback on, but my view is an answer about general techniques is more valuable for this site. I’ll leave the details in, in case anyone googling this bumped into the same service.

My questions:

  1. What are general techniques and resources for identifying an unknown service, or something on a non-standard port that isn’t being talkative?

  2. Does the behaviour below ring a bell with anyone? (Are there steps I have missed to further identify the service?)

While on an engagement, we have encountered an open port, 10001.
As you might’ve guessed, as far as I can tell it does not respond to protocols usually used on that port. My search has not been completely exhaustive but I have fuzzed the first three bytes and found a response for the first byte.

Observations on my specific unknown service:

  • Speaks TCP

  • When sent a capital i, I\n, it responds I213529 (last digits changed for privacy)

  • Messages seem to be null- and newline-terminated; anything but those after the capital i do not affect the behaviour, but a null before it will impair the response.

  • nmap shows it as scp-config, once as tcpwrapped

Continue reading General techniques for identifying an unknown service

Week 47 In Review – 2016

Events Related BSides DC 2016 – Opening – www.youtube.com Alex Norman does what Alex Norman does best. Open the con. Inspirational, motivational and most importantly… short. AppSecUSA 2016 – www.youtube.com Recordings from AppSecUSA 2016 in Washington, DC Highlights from the O’Reilly Security Conference in Amsterdam 2016 – www.oreilly.com Watch highlights covering security, defense, tools, and […]

The post Week 47 In Review – 2016 appeared first on Infosec Events.

Continue reading Week 47 In Review – 2016