First page Back Continue Last page Graphics

NMAP (2)

  • TCP FIN scan Closed ports reply to FIN with RST Not reliable. (very) old sites won't notice nmap -sF 192.168.0.1
  • Fragmented scan Uses a fragmented TCP header Doesn't always work nmap -sS -f 192.168.0.1
  • Reverse IDENTD scan if identd is running, requests the owner of a running daemon nmap -I 192.168.0.1