Advertisement
Guest User

Nmap Scan Explanation

a guest
Aug 9th, 2021
33
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.49 KB | None | 0 0
  1. -sS | SYN Scan
  2. | Never Establishes full TCP connection
  3. | Does only first step of Three Way Handshake and gives output according to the SYN/ACK response by the target
  4. | If target sends 'RST', which stands for reset, it means that port is closed. Else it gives response filtered or other results.
  5.  
  6. -sV | Discovering Version of Service
  7. | We can decide it's intensity between 0 to 9. (Default 7)
  8. | E.g. nmap -sV --version-intensity 9 <ip>
  9.  
  10. -Pn | Already explained there
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement