Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
144
the other hand, imposes some traffic rate limiting that results in less bandwidth
congestion and more covert behavior.
Having learned about Nmap’s basic use, we’ll now explore some of Nmap’s various scanning
techniques, beginning with
Stealth / SYN Scanning
.
The most popular Nmap scanning technique is SYN, or “stealth” scanning.
259
There are many
benefits to using a SYN scan and as such, it is the default scan option used when no scan option
is specified in an nmap command
and
the user has the required raw socket privileges.
SYN scanning is a TCP port scanning method that involves sending SYN packets to various ports
on a target machine without completing a TCP handshake. If a TCP port is open, a SYN-ACK
should be sent back from the target machine, informing us that the port is open. At this point, the
port scanner does not bother to send the final ACK to complete the three-way handshake.
kali@kali:~$
Yüklə
Dostları ilə paylaş: