Chapter 5

Nmap

Now let’s make use of a tool called Nmap. As you will see, Nmap can tell us many things—or at the very least, put us in a better position than we were. As we go through Nmap you will see that I repeat some explanations of switches and parameters at various intervals. I do that for two reasons. One is so that you don’t have to search around for the explanation again. And the other is to help instill it better in your memory. First, we will put a table in place that we can use for reference:

Nmap Switch

Type of Packet Sent

Response if Open

Response if Closed

Notes

Nmap Switch

Type of Packet Sent

Response if Open

Response if Closed

Notes

-sT

Operating system (OS)-based connect

Connection made ...

Get Conducting Network Penetration and Espionage in a Global Environment now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.