Nmap Main Scan types -sA, -sL, -P0

Oğuz~#>

Kıdemli Üye
5 Tem 2009
4,772
16
Bursa
ACK scanning (-sA)

The ACK scanning is an advanced method in Nmap, usually used to map out firewall rulesets. It helps to determine whether a firewall is stateful or not. ACK scanning sends an ACK packet to the specified ports. If an RST comes back, the specified ports are classified as ‘unfiltered’. If nothing comes back, the ports are determined as ‘filtered’. The scan never showing ports indicates they’re in the ‘open’ state.
Below is the example in our laboratory.

[FONT=&quot]#nmap –sA –v 10.50.1.254[/FONT]
[FONT=&quot]Starting Nmap V. 2.54BETA30[/FONT]
[FONT=&quot]Host vpn1-gw.lab.tct.hut.fi (10.50.1.254) appears to be up ... good.[/FONT]
[FONT=&quot]Initiating ACK Scan against vpn1-gw.lab.tct.hut.fi (10.50.1.254)[/FONT]
[FONT=&quot]The ACK Scan took 1 second to scan 1549 ports.[/FONT]
[FONT=&quot]All 1549 scanned ports on vpn1-gw.lab.tct.hut.fi (10.50.1.254) are: UNfiltered[/FONT]

[FONT=&quot]Nmap run completed -- 1 IP address (1 host up) scanned in 1 second[/FONT]

List scanning (-sL)


List scanning generates and prints a list of IPs/Names without actually pinging or port scanning them. The outputs are shown below.
[FONT=&quot]#nmap –sL –v 10.50.1.254 [/FONT]
[FONT=&quot]Starting Nmap V. 2.54BETA30[/FONT]
[FONT=&quot]Host vpn1-gw.lab.tct.hut.fi (10.50.1.254) not scanned[/FONT]

[FONT=&quot]Nmap run completed -- 1 IP address (0 hosts up) scanned in 0 seconds[/FONT]

P0 option (-P0)

An option that is useful with scans is "-P0". Also called ‘Don’t ping host.’ Do not try and ping host at all before scanning them. This option allows the scanning of networks that don’t allow ICMP echo requests (for example, Microsoft.com) through their firewalls. Since Nmap will ping a target with both TCP "ping" and ICMP echo before attempting a port scan, sites blocking ICMP and TCP probes will not be scanned by default.
[FONT=&quot]#nmap –p0 –v 10.50.1.254[/FONT]

[FONT=&quot]Starting Nmap V. 2.54BETA30[/FONT]
[FONT=&quot]Interesting ports on vpn1-gw.lab.tct.hut.fi (10.50.1.254):[/FONT]
[FONT=&quot](The 1543 ports scanned but not shown below are in state: closed)[/FONT]
[FONT=&quot]Port State Service[/FONT]
[FONT=&quot]23/tcp open telnet [/FONT]
[FONT=&quot]24/tcp open priv-mail [/FONT]
[FONT=&quot]80/tcp open http [/FONT]
[FONT=&quot]139/tcp open netbios-ssn [/FONT]
[FONT=&quot]515/tcp open printer [/FONT]
[FONT=&quot]1723/tcp open pptp [/FONT]


[FONT=&quot]Nmap run completed -- 1 IP address (1 [/FONT]
 
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.