NMAP (Part 2): Basic Port Scanning Types

  1. It can be used to bypass older Intrusion Detection Systems as they will be looking for three-way handshake.
  2. SYN scans can remain stealthy as they are not usually not logged by applications listening on ports.
  3. SYN scans are slightly faster since it does not need to complete the whole three-way handshake.
  1. SYN scans require sudo permissions to work correctly in Linux as SYN scans require the ability to create raw packets.
  2. SYN scans could cause unstable services so it could be problematic if a client has a productive environment to test.
Reference: https://nmap.org/book/scan-methods-udp-scan.html

--

--

--

A food lover, a cyber security enthusiast, a musician and a traveller, so you will see a mix of different contents in my blog. ☺️

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Adding Enemy Spawn Waves to 2D Galaxy Shooter in Unity-Part 01!

Quality Control vs Quality Assurance

Streaming With Probabilistic Data Structures: Why & How

Programming Design — OOP,DDD

How to efficiently automate bulk data movement from Google BigQuery to Snowflake

How to Develop and Test Document Upload Rest API in Salesforce?

Panning Security Cameras in Unity

3 Principles to Get Your Pull Request Reviewed Faster

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
goay xuan hui

goay xuan hui

A food lover, a cyber security enthusiast, a musician and a traveller, so you will see a mix of different contents in my blog. ☺️

More from Medium

How to configure and setup SSH public keys, the right way.

#6 NETWORK MEDIA TYPES: THE NETWORKING SERIES

How to train your MikroTik Router — Transparent proxying using NAT