NMAP (Part 2): Basic Port Scanning Types

  1. It can be used to bypass older Intrusion Detection Systems as they will be looking for three-way handshake.
  2. SYN scans can remain stealthy as they are not usually not logged by applications listening on ports.
  3. SYN scans are slightly faster since it does not need to complete the whole three-way handshake.
  1. SYN scans require sudo permissions to work correctly in Linux as SYN scans require the ability to create raw packets.
  2. SYN scans could cause unstable services so it could be problematic if a client has a productive environment to test.
Reference: https://nmap.org/book/scan-methods-udp-scan.html

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
goay xuan hui

goay xuan hui

A food lover, a cyber security enthusiast, a musician and a traveller, so you will see a mix of different contents in my blog. ☺️