- Applied Network Security
- Arthur Salmon Warun Levesque Michael McLafferty
- 130字
- 2021-07-02 23:30:56
Scan using TCP connect
This is the command to scan using the TCP connect option. If a user does not have raw packet privileges, this is the command they will use:
nmap -sT 192.168.0.9

Privileged access is necessary to perform the default SYN scans. If privileges are not sufficient, a TCP connect scan will be used. A TCP connect scan needs a full TCP connection to be established, and is known to be a slower scan than SYN scans. Disregarding discovery is often required as many firewalls or hosts will not answer to ping, so it could be missed, unless you choose the -Pn parameter. Of course, this can make the scan times much longer as you could end up sending scan probes to hosts that are not even there.
推薦閱讀
- 暗戰(zhàn)亮劍:黑客滲透與防御全程實(shí)錄
- 計(jì)算機(jī)使用安全與防護(hù)
- 黑客攻防入門秘笈
- 工業(yè)物聯(lián)網(wǎng)安全
- 硬黑客:智能硬件生死之戰(zhàn)
- 局域網(wǎng)交換機(jī)安全
- 學(xué)電腦安全與病毒防范
- Web安全之深度學(xué)習(xí)實(shí)戰(zhàn)
- 互聯(lián)網(wǎng)企業(yè)安全高級(jí)指南
- 編譯與反編譯技術(shù)實(shí)戰(zhàn)
- 黑客攻防實(shí)戰(zhàn)從入門到精通
- 華為Anti-DDoS技術(shù)漫談
- 網(wǎng)絡(luò)空間安全法律問題研究
- 云計(jì)算安全技術(shù)與應(yīng)用
- 黑客攻防入門