How it works…

These options help the user to streamline their requirement to identify the open ports and thus perform further attacks. Using these different port scan options, a user can target a specific port and protocol to obtain the current status of the port. Further reconnaissance can be performed on the port by obtaining the exact service name and the version, which we will see in further sections of the book.

Get Network Scanning Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.