- Applied Network Security
- Arthur Salmon Warun Levesque Michael McLafferty
- 130字
- 2021-07-02 23:30:56
Scan using TCP connect
This is the command to scan using the TCP connect option. If a user does not have raw packet privileges, this is the command they will use:
nmap -sT 192.168.0.9

Privileged access is necessary to perform the default SYN scans. If privileges are not sufficient, a TCP connect scan will be used. A TCP connect scan needs a full TCP connection to be established, and is known to be a slower scan than SYN scans. Disregarding discovery is often required as many firewalls or hosts will not answer to ping, so it could be missed, unless you choose the -Pn parameter. Of course, this can make the scan times much longer as you could end up sending scan probes to hosts that are not even there.
推薦閱讀
- 網(wǎng)絡(luò)空間攻防技術(shù)原理
- 黑客攻防入門秘笈
- 走進(jìn)新安全:讀懂網(wǎng)絡(luò)安全威脅、技術(shù)與新思想
- 反黑命令與攻防從新手到高手(微課超值版)
- 學(xué)電腦安全與病毒防范
- API安全技術(shù)與實(shí)戰(zhàn)
- 網(wǎng)絡(luò)用戶行為的安全可信分析與控制
- 空間群組密鑰管理研究:基于自主的深空DTN密鑰管理
- 數(shù)據(jù)安全架構(gòu)設(shè)計(jì)與實(shí)戰(zhàn)
- VMware vCloud Security
- INSTANT Kali Linux
- Android Application Security Essentials
- 云計(jì)算安全技術(shù)與應(yīng)用
- 黑客攻防從入門到精通:實(shí)戰(zhàn)篇(第2版)
- Python Penetration Testing Essentials