Nmap Flashcards
Syn Scan
-sS
SYN scans sends back a RST TCP packet after receiving a SYN/ACK from the server. Referred to as “half-open” or stealth scans
UDP Scan
-sU
OS Detection
-O
Version of services running on target
-sV
Increase verbosity
-v, with more v’s meaning higher verbosity
Ex: -vv
Output scan in normal format
-oN
Output scan in XML format
-oX
Output scan in greppable format
-oG
Output scan in the three major formats at once
-oA
Activate aggressive mode
-A
This is a shorthand switch that activates service detection, operating system detection, a traceroute and common script scanning.
Increase speed of scan (and drawbacks)
-T(x) with x being 1-5 sets the speed.
Higher levels are noisier and can generate errors
Specify ports- single, range, all
Single: -p (x) [-p 80]
Range: -p (x)-(y) [1000-1500]
All: -p-
TCP Connect Scan
-sT
TCP Connect scan works by performing the three-way handshake with each target port in turn. In other words, Nmap tries to connect to each specified TCP port, and determines whether the service is open by the response it receives.
What does a “filtered” port indicate?
That it is protected by firewall, and the incoming packet was dropped.
If a port is closed, which flag should the server send back to indicate this?
RST