LinuxCommandLibrary

amap

Identify service on a port

TLDR

Identify service on a port

$ amap -b [192.168.1.1] [80]
copy
Scan port range
$ amap [192.168.1.1] [1-1000]
copy
Scan with banner grabbing
$ amap -B [192.168.1.1] [80]
copy
Use UDP scan
$ amap -u [192.168.1.1] [53]
copy
Scan quietly (minimal output)
$ amap -q [192.168.1.1] [80]
copy

SYNOPSIS

amap [options] target port[-port]

DESCRIPTION

amap (Application Mapper) is a next-generation scanning tool that identifies applications and services running on network ports by sending trigger packets and analyzing responses. Unlike simple port scanners, it can identify services running on non-standard ports.
The tool compares responses against a signature database to fingerprint applications, making it useful for security assessments and network auditing.

PARAMETERS

-b

Banner grabbing mode (just grab banners)
-B
Banner and identification mode
-u
UDP mode (default is TCP)
-q
Quiet mode (less output)
-v
Verbose output
-1
Stop after first match
-6
IPv6 mode
-A
Aggressive mode (more triggers)
-p proto
Only scan for specific protocol
-i file
Read targets from file
-o file
Write results to file

CAVEATS

For authorized security testing only. May trigger intrusion detection systems. Some services may not respond to trigger packets. Signature database may not include newer applications.

HISTORY

amap was developed by THC (The Hacker's Choice) and released in the early 2000s as a complement to port scanners, focusing on application-layer identification.

SEE ALSO

nmap(1), netcat(1), masscan(1)

Copied to clipboard