This document discusses fingerprinting database services beyond simple banner grabbing. It introduces THC-AMAP and Nmap, which were early tools able to identify services running on non-standard ports or with non-ASCII banners. The document advocates going beyond hosts to fingerprint specific database instances, versions, and vulnerabilities. It presents the VSAM and ESAM techniques for automated fingerprinting of Microsoft SQL Server versions and known vulnerabilities across multiple database instances on a host.