The command in question:
wget 192.168.0.15 -q -S
wget is a command-line utility used to retrieve files via HTTP, HTTPS, or FTP.
-q (quiet mode): Suppresses output, except for errors.
-S: Displays the server response headers (even in quiet mode).
In this case, wget is being used to connect to the specified web server (192.168.0.15) and retrieve the HTTP response headers — such as the Server field (e.g., Apache, Nginx), HTTP status codes, and other metadata.
This is a classic example of banner grabbing — the process of capturing metadata (often from headers) to identify the software, version, or configuration of a service.
Incorrect Options:
A. Content enumeration would require directory brute-forcing tools like DirBuster or Gobuster.
C. DoS attacks require high volumes of traffic or specially crafted packets; wget with a single request does not perform flooding.
D. Downloading full site contents would involve options like -r (recursive) or --mirror, which are not used in this command.
Reference – CEH v13 Official Courseware:
Module 03: Scanning Networks
Section: “Banner Grabbing”
Tool Reference: wget, netcat, telnet, curl for banner enumeration