When using NMAP, there are basic scans which are used to find specific information. There are four basic scans used the most by NMAP and can be handy depending on what you need to discover on a system or a network.
Let's start by listing the basic scans. The four basic scans are:
The TCP SYN scan is the default scan for NMAP. The TCP SYN scan performs the start of a partial 3-way handshake. The TCP SYN performs the following:
NOTE: Keep in mind that the TCP SYN scan requires Root privileges to run.
The partial 3-way handshake is not completed, so it is called a half-open session. Half-open sessions are not logged on the Target, but does cause a lot of RST Frames on the network which can be detected by Intrusion Detection Systems if RST Frames are being monitored.
Since a reset (RST) is sent to the Target, the connection is not made. The resources used on the Target system is minimal because the connection is not made.
If the Port is closed on the Target system, then the following occurs:
Another option is that the Port is filtered by a Firewall between the Source and Target. In the case of filtering, the 3-way handshake occurs as follows:
Let's start by listing the basic scans. The four basic scans are:
- PING Scan (-sP)
- UDP Scan (-sU)
- TCP SYN Scan (-sS)
- TCP Connect Scan (-sT)
The TCP SYN scan is the default scan for NMAP. The TCP SYN scan performs the start of a partial 3-way handshake. The TCP SYN performs the following:
- Source sends a SYN (sync) + Port number to Target
- Target responds with a SYN (sync)/ACK (acknowledgment) to the Source when the Port is open
- Source sends a RST (reset) to the Target to stop the 3-way handshake
NOTE: Keep in mind that the TCP SYN scan requires Root privileges to run.
The partial 3-way handshake is not completed, so it is called a half-open session. Half-open sessions are not logged on the Target, but does cause a lot of RST Frames on the network which can be detected by Intrusion Detection Systems if RST Frames are being monitored.
Since a reset (RST) is sent to the Target, the connection is not made. The resources used on the Target system is minimal because the connection is not made.
If the Port is closed on the Target system, then the following occurs:
- Source sends a SYN (sync) + Port number to Target
- Target responds with a RST (reset) to the Source system
Another option is that the Port is filtered by a Firewall between the Source and Target. In the case of filtering, the 3-way handshake occurs as follows:
No comments :
Post a Comment