November 2019
Beginner
550 pages
13h 14m
English
When Nmap is about to perform a scan on a host, it sends a ping packet to the host to determine whether the target is alive. If the target does not respond, Nmap will not attempt to execute the scan. However, system administration and cybersecurity professionals usually disable Internet Control Message Protocol (ICMP) responses on servers. Not receiving an ICMP echo reply from a target would indicate that the target device is down/offline; however, this technique sets out to basically trick a novice hacker into thinking the host is simply not available. Using the –Pn operator during an Nmap scan will skip the host discovery phase and treat the target as online.
The following is an example:
nmap -Pn ...
Read now
Unlock full access