Nmap Port Scan (TCP , UDP , ACK, SYNC,…) – POFTUT

Nmap Port Scan (TCP , UDP , ACK, SYNC,…)

[rps-include post=6632]

This chapter is real part of the scanning. In this chapter we will look how to define port scanning parameters. The techniques described in this chapter generally requires privileged user which means root or Administrator user.

Tcp Syn Scan

This scan is default and most popular scan. This scan is also referred half open scan. In this scan only tcp syn packets are sent to the target.

  • -sS is used to send syn packets.

Tcp Connect Scan

This is scan is an alternative for the Tcp Syn Scan. This scan do not requires privileged user. Scan is done with completing 3 way hand shake.

Udp Scan

Tcp is default protocol for scan. But udp can be activated with -sU .

Tcp Null Scan

Null scan done by setting tcp flag header 0. New firewall walls can detect this scan

Tcp Fin Scan

This scan done by sending tcp packets with FIN flag set. New systems can detect this scan.

Xmas Scan

This scan is done by setting FIN,PSH,URG flags. New systems can detect this scan.

Tcp Ack Scan

In this scan technique tcp packets sends with ack flag is set. If target response this means the port is open or closed.

Tcp Window Scan

This scan is more detailed version of Tcp Ack Scan. We can prevent using it.

LEARN MORE  Compare TCP vs UDP Protocols , Differences and Similarities

Tcp Maimon Scan

Generally an uneffective for most os the systems.

Custom Tcp Scan

Nmap gives users the ability to modify low level details like flag. ACK, URG, PSH, RST, SYN, FIN tcp flags can be used for scan.

  • –scanflags will set ACK and URG  flags

Idle Scan

This is an advanced scan where no packet sent with our real ip address to target. A zombie host is selected and packets are send behalf of it. This scan also show trust relationship between zombie and target.

  • -sI provides 10.0.0.2 as zombie and 10.0.0.10 as target.

Ip Protocol Scan

This scan will determine which is protocols are supported by target.

[rps-include post=6632]

Leave a Reply

Your email address will not be published. Required fields are marked *

Enjoy this blog? Please spread the word :)