Nmap Scan Types Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Question | Answer |
Full Scan(SYN) Response = RST | Closed Port |
Full Scan(SYN) Response = SYN/ACK | Open Port |
Stealth Scan(SYN) Response = RST | Closed Port |
Stealth Scan(SYN) Response = SYN/ACK | Open Port |
XMAS Scan(FIN/URG/PSH) Response = No response | Open Port |
XMAS Scan(FIN/URG/PSH) Response = RST | Closed Port |
Inverse TCP(FIN,URG OR PSH or no flags set) Response = No Response | Open Port |
Inverse TCP(FIN,URG OR PSH or no flags set) = RST/ACK | Closed Port |
ACK scan | -sA |
FIN scan | -sF |
IDLE scan | -sI |
DNS scan or list scan | -sL |
NULL scan | -sN |
Protocol scan | -sO |
Ping scan | -sP |
RPC scan | -sR |
SYN scan | -sS |
TCP connect scan | -sT |
Windows scan | -sW |
XMAS scan | -sX |
ICMP ping | -PI |
No ping | -Po |
SYN ping | -PS |
TCP ping | -PT |
Normal output | -oN |
XML output | -oX |
Serial, slowest scan | -T0 |
Serial Slowest scan | -T1 |
Serial normal speed scan | -T2 |
Parallel normal speed scan | -T3 |
Parallel fast scan | -T4 |
Nmap TCP Connect Scan | nmap -sT <IPAddress> |
Nmap Identify Host Name (List Scan) | nmap -sL <IPAddress/24> |
Nmap Identify Operating System of a Host | nmap -O <IPAddress> |
Nmap Scan for open ports | nmap <IPAddress> |
Nmap Ping Scan | nmap -sP <IPAdress> |
Nmap Version Detection | nmap -sV <IPAddress> or nmap -A <IPAddress> |
Nmap SYN Scan | nmap -sS <IPAddress> |
Nmap UDP Scan | nmap sU <IPAddress> |
Nmap Fast Scan | nmap -T4 -F <IPAddress> |
Created by:
Dks0512
Popular Computers sets