Nmap half-open/stealth scan
This option will start by sending (SYN) a connection on each port on a target host. If the port is open, the host will reply to the request with (SYN, ACK).
If the port is not open (that is, closed), the host will answer with a connection reset (RST).
If no response is received, it is assumed that the port is filtered. The difference between a TCP scan and a stealth scan is that the connection initiator will not respond with an acknowledgement (ACK) packet. What makes this an effective scan is that since a full connection wasn't established it won't be logged.
推薦閱讀
- Node Security
- 數據恢復方法及案例分析
- Kali Linux CTF Blueprints
- Metasploit Penetration Testing Cookbook(Second Edition)
- Wireshark 2 Quick Start Guide
- 計算機病毒分析與防范大全(第3版)
- Mastering Kali Linux for Advanced Penetration Testing
- Preventing Digital Extortion
- 網絡安全技術與實訓(第4版)(微課版)
- 隱私計算
- 持續集成:軟件質量改進和風險降低之道
- 網絡服務安全與監控
- 物聯網信息安全技術
- 信息內容安全管理及應用
- Developing Applications with Salesforce Chatter