Scan types

-sS

  • Quick and lightweigth since the handshake is not completed

  • Allow to differentiate between opened, filtered and closed ports

  • Default when nmap is run as root

-sT

  • Less efficient than -sS since it has to wait for the whole TCP handshake to complete

  • Leaves traces in target's logfiles

  • Default when nmap is not run with root privileges

  • Guaranteed to work with proxychains

-sU

  • UDP scan, can be combined with TCP ones

  • Very slow since most systems limit the number of responses per second

  • Better prioritize the most used ports instead of scanning all 65535

-sY

  • SCTP equivalent of the TCP Syn scan

  • Fast and efficient

-sZ

  • SCTP equivalent of -sN scan

  • Stealthier and reliable

  • Cannot distinguish between open and filtered ports

-sN; -sF; -sX

  • Exploit a loophole in RFC that can be used to sneak through IDS

  • More chance of hiding the attack from detection

  • The effectiveness of the scan depends on the implementation of the RFC 789 on the target machine

  • More reliable against Unix-based systems

  • Cannot distinguish open ports from filtered ones

-sM

  • Works like the -sN scan, but with ACK/FIN flags

  • Many BSD-based systems simply drop the packet

-sA

  • Is used to map firewall rulesets, finding out which ports are filtered

  • All reachable ports are mapped as unfiltered

  • Ports that are unreachable or send back certain ICMP error messages are mapped as filtered

  • Unable to determine if a port is open or closed

-sW

  • Works the same way as the -sA scan

  • Is also able to differentiate between open and closed ports depending on the size of their window (0 if port is closed)

  • Unreliable, only a minority of all devices implement the window in this way

  • System that don't support this scan report all ports as closed

  • If you find lots of closed ports and just a handful of filtered ones, than the system might be suscectible, even the reverse is true: if you find lots of filtered ports and just a couple of closed ones then they might actually be open

-s0

  • Allows to detect which IP protocols run on a given port

  • Certain systems expect custom headers so some ports might be flagged as closed or open|filtered

  • Does not test for TCP, UDP, ICMP, SCTP, and IGMP

Last updated