- Applied Network Security
- Arthur Salmon Warun Levesque Michael McLafferty
- 130字
- 2021-07-02 23:30:56
Scan using TCP connect
This is the command to scan using the TCP connect option. If a user does not have raw packet privileges, this is the command they will use:
nmap -sT 192.168.0.9

Privileged access is necessary to perform the default SYN scans. If privileges are not sufficient, a TCP connect scan will be used. A TCP connect scan needs a full TCP connection to be established, and is known to be a slower scan than SYN scans. Disregarding discovery is often required as many firewalls or hosts will not answer to ping, so it could be missed, unless you choose the -Pn parameter. Of course, this can make the scan times much longer as you could end up sending scan probes to hosts that are not even there.
推薦閱讀
- Extending Symfony2 Web Application Framework
- 信息安全導(dǎo)論(在線實(shí)驗(yàn)+在線自測(cè))
- CTF實(shí)戰(zhàn):技術(shù)、解題與進(jìn)階
- Rootkit和Bootkit:現(xiàn)代惡意軟件逆向分析和下一代威脅
- Mastering Kali Linux for Advanced Penetration Testing
- Preventing Digital Extortion
- API攻防:Web API安全指南
- Python Penetration Testing Cookbook
- Building a Home Security System with BeagleBone
- Mastering Reverse Engineering
- SQL Injection Strategies
- 網(wǎng)絡(luò)服務(wù)安全與監(jiān)控
- 計(jì)算機(jī)網(wǎng)絡(luò)安全實(shí)驗(yàn)指導(dǎo)
- Kali Linux無(wú)線網(wǎng)絡(luò)滲透測(cè)試詳解
- 從實(shí)踐中學(xué)習(xí)Nmap滲透測(cè)試