Skip to content
bughra.dev
Go back

Network Enumeration with Nmap

TCP/UDP Port States

TCP Flags

Nmap Scan TCP and UDP Scan Parameters

Nmap Fine-tuning Scope and Performance

Nmap Live Host Discovery

Nmap Scanning Network Range

Nmap Advanced Port Scan

Nmap Spoofing and Decoys

Nmap Fragmented Packets

Nmap Idle/Zombie Scan

Attacker                 Zombie Machine               Target System
    |                          |                          |
    |-- IPID query ----------->|                          |
    |<-- IPID=X response ------|                          |
    |                          |                          |
    |-- Spoofed SYN (Source: Zombie IP) ----------------->|
    |                          |                          |
    |                          |<- SYN-ACK (port is open) |
    |                          |--  RST ----------------->|
    |                          |   (IPID increased)       |
    |                          |                          |
    |-- IPID query ------==--->|                          |
    |<-- IPID=X+1 response ----|                          |

Share this post on:

Previous Post
Log Poisoning via User-Agent
Next Post
Passive and Active Reconnaissance