Skip to content

Aziz018/nmap_scans

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 

Repository files navigation

nmap_scans

  • TCP SYN Scan (-sS): Also known as half-open scanning, it sends SYN packets to initiate a TCP connection. It's stealthy and fast.
  • TCP Connect Scan (-sT): This scan type completes the TCP three-way handshake, making it more reliable but less stealthy than SYN scanning.
  • TCP ACK Scan (-sA): It sends ACK packets to determine whether ports are filtered by firewalls. It doesn't establish a full connection.
  • TCP FIN Scan (-sF): It sends FIN packets to check if ports are closed. Closed ports should send back a RST packet, while open ones will ignore the FIN packet.
  • TCP Xmas Scan (-sX): Similar to FIN scan, but it sets multiple TCP flags (FIN, URG, and PSH) to probe ports.
  • TCP Null Scan (-sN): This scan type sets no TCP flags, expecting different behavior from closed and open ports.
  • UDP Scan (-sU): It sends UDP packets to a range of ports and waits for responses. UDP is connectionless, so this scan is less reliable.
  • TCP Window Scan (-sW): It analyzes the TCP Window field to determine open ports.
  • TCP Maimon Scan (-sM): It impersonates a specific source IP and port by sending SYN packets.
  • TCP RPC Scan (-sR): It enumerates RPC services by sending RPC queries to a range of ports.
  • Version Detection (-sV): It probes open ports to determine the services and versions running on them.
  • OS Detection (-O): It tries to determine the operating system of the target by analyzing network packets.
  • Aggressive Scan (-A): This combines several scan types like version detection, OS detection, script scanning, and traceroute into one command.
  • Script Scan (-sC): It runs default Nmap scripts against the target to gather more information.
  • IP Protocol Scan (-sO): It determines which IP protocols (TCP, UDP, ICMP, etc.) are supported by the target.
  • Idle Scan (-sI): Also known as zombie scan, it uses a third-party host to hide the attacker's identity.
  • Fragmentation Scan (-f): It sends fragmented packets to bypass packet filters and firewalls.
chmod +x nmap_scans.sh
./nmap_scans.sh

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages