amap
Identify application protocols on network ports
TLDR
Identify service on a port
SYNOPSIS
amap [options] target port[-port]
DESCRIPTION
amap (Application Mapper) is a next-generation scanning tool that identifies applications and services running on network ports by sending trigger packets and analyzing responses. Unlike simple port scanners, it can identify services running on non-standard ports.
The tool compares responses against a signature database to fingerprint applications, making it useful for security assessments and network auditing.
PARAMETERS
-b
Banner grabbing mode (just grab banners)-B
Banner and identification mode-u
UDP mode (default is TCP)-q
Quiet mode (less output)-v
Verbose output-1
Stop after first match-6
IPv6 mode-A
Aggressive mode (more triggers)-p proto
Only scan for specific protocol-i file
Read targets from file-o file
Write results to file
CONFIGURATION
/etc/amap/appdefs.trig
Trigger definitions file containing packets sent to identify services./etc/amap/appdefs.resp
Response signatures file used to match and identify application protocols.
CAVEATS
For authorized security testing only. May trigger intrusion detection systems. Some services may not respond to trigger packets. Signature database may not include newer applications.
HISTORY
amap was developed by THC (The Hacker's Choice) and released in the early 2000s as a complement to port scanners, focusing on application-layer identification.
