User Tools

Site Tools


ubuntu:nmap:perform_a_tcp_null_scan_to_fool_a_firewall

Ubuntu - nmap - Perform a tcp null scan to fool a firewall

sudo nmap -sN 192.168.1.69

result:

Starting Nmap 6.40 ( http://nmap.org ) at 2016-07-08 01:34 BST
Nmap scan report for peter-laptop-1 (192.168.1.69)
Host is up (0.000075s latency).
Not shown: 997 closed ports
PORT    STATE         SERVICE
80/tcp  open|filtered http
139/tcp open|filtered netbios-ssn
445/tcp open|filtered microsoft-ds
 
Nmap done: 1 IP address (1 host up) scanned in 97.33 seconds
ubuntu/nmap/perform_a_tcp_null_scan_to_fool_a_firewall.txt · Last modified: 2020/07/15 09:30 by 127.0.0.1

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki