nmap:perform_a_tcp_null_scan_to_fool_a_firewall
nmap - Perform a tcp null scan to fool a firewall
sudo nmap -sN 192.168.1.69
Result:
Starting Nmap 6.40 ( http://nmap.org ) at 2016-07-08 01:34 BST Nmap scan report for peter-laptop-1 (192.168.1.69) Host is up (0.000075s latency). Not shown: 997 closed ports PORT STATE SERVICE 80/tcp open|filtered http 139/tcp open|filtered netbios-ssn 445/tcp open|filtered microsoft-ds Nmap done: 1 IP address (1 host up) scanned in 97.33 seconds
nmap/perform_a_tcp_null_scan_to_fool_a_firewall.txt · Last modified: 2020/07/20 13:37 by 95.91.74.120