Chapter 5
Nmap
Now let’s make use of a tool called Nmap. As you will see, Nmap can tell us many things—or at the very least, put us in a better position than we were. As we go through Nmap you will see that I repeat some explanations of switches and parameters at various intervals. I do that for two reasons. One is so that you don’t have to search around for the explanation again. And the other is to help instill it better in your memory. First, we will put a table in place that we can use for reference:
Nmap Switch |
Type of Packet Sent |
Response if Open |
Response if Closed |
Notes |
Nmap Switch |
Type of Packet Sent |
Response if Open |
Response if Closed |
Notes |
-sT |
Operating system (OS)-based connect |
Connection made ... |
Get Conducting Network Penetration and Espionage in a Global Environment now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.