Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
145
When a user running nmap does
not have raw socket privileges, Nmap will default to the TCP
connect scan
260
technique. Since an Nmap TCP connect scan makes use of the Berkeley sockets
API
261
to perform the three-way handshake, it does not require elevated privileges. However,
because Nmap has to wait for the connection to complete before the API will return the status of
the connection, a TCP connect scan takes much longer to complete than a SYN scan.
We may occasionally need to perform a connect scan using nmap, such as when scanning via
certain types of proxies. We can use the -sT option to start a connect scan.
kali@kali:~$
Yüklə
Dostları ilə paylaş: