O'Reilly logo

Conducting Network Penetration and Espionage in a Global Environment by Bruce Middleton

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5

Nmap

Now let’s make use of a tool called Nmap. As you will see, Nmap can tell us many things—or at the very least, put us in a better position than we were. As we go through Nmap you will see that I repeat some explanations of switches and parameters at various intervals. I do that for two reasons. One is so that you don’t have to search around for the explanation again. And the other is to help instill it better in your memory. First, we will put a table in place that we can use for reference:

Nmap Switch

Type of Packet Sent

Response if Open

Response if Closed

Notes

Nmap Switch

Type of Packet Sent

Response if Open

Response if Closed

Notes

-sT

Operating system (OS)-based connect

Connection made ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required