Jump to content

nmap question


Vurraz
 Share

Recommended Posts

  • 2 weeks later...

Depends on what your scanning.

  • T1 is a far less aggressive scan when compared to T5, you might want to look into other speed options
  • sS can be mistaken for syn-flood attacks on some basic firewalls and IDS systems, sometimes sT is quicker across network boundaries
  • sU UDP can be very unreliable, combine it with Application triggers -A (aggressive scan) to more accurately determine open ports, but then increases the chances of detection
  • Also nmap inserts a fixed string into all packets any IDS (example Snort) can easily fingerprint an nmap scan, think of alternative scanning engines

When in doubt or unsure

man nmap
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...