[rps-include post=6632]
[rps-include post = 6632]
This chapter is real part of the scanning. In this chapter we will look how to define port scanning parameters. The techniques described in this chapter generally requires privileged user which means root or Administrator user.
本章是扫描的真正部分。 在本章中,我们将研究如何定义端口扫描参数。 本章中介绍的技术通常需要特权用户,即root用户或Administrator用户。
Tcp同步扫描 (Tcp Syn Scan)
This scan is default and most popular scan. This scan is also referred half open scan. In this scan only tcp syn packets are sent to the target.
此扫描是默认扫描,也是最受欢迎的扫描。 此扫描也称为半开扫描。 在此扫描中,仅将tcp syn数据包发送到目标。
$ nmap -sS google.com
-sS is used to send syn packets.
-sS用于发送syn数据包。
Tcp Connect扫描 (Tcp Connect Scan)
This is scan is an alternative for the Tcp Syn Scan. This scan do not requires privileged user. Scan is done with completing 3 way hand shake.
这是Tcp Syn Scan的替代扫描。 此扫描不需要特权用户。 完成三向握手后即可进行扫描。
$ nmap -sT google.com
Udp扫描 (Udp Scan)
Tcp is default protocol for scan. But udp can be activated with -sU .
Tcp是扫描的默认协议。 但是udp可以使用-sU激活。
$ nmap -sU google.com
Tcp空扫描 (Tcp Null Scan)
Null scan done by setting tcp flag header 0. New firewall walls can detect this scan
通过将tcp标志标头设置为0可以完成空扫描。新的防火墙墙可以检测到此扫描
$ nmap -sN google.com
Tcp Fin扫描 (Tcp Fin Scan)
This scan done by sending tcp packets with FIN flag set. New systems can detect this scan.
通过发送设置了FIN标志的tcp数据