Stealth scanning with Nmap

As with most scanning requirements, Nmap has an option that simplifies and streamlines the process of performing TCP stealth scans:

  1. To perform TCP stealth scans with Nmap, the -sS option should be used with the IP address of the host that is to be scanned:
  1. In the example provided, a SYN scan was performed on the TCP port 80 of the specified IP address. Similar to the technique explained with Scapy, Nmap listens for a response and identifies the open ports by analyzing the TCP flags that are activated in any responses received. We can also use Nmap to perform scans on multiple specified ports by passing a comma-delimited ...

Get Kali Linux Network Scanning Cookbook - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.