Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/auxiliary/scanner/portscan/syn.md
Views: 11655
Description
This module will attempt to initiate a TCP/IP connection with ports on the victim machine. It is this done by sending a SYN packet, and if victim replies with a SYN/ACK packet that means the port is open. Then the attacker sends a RST packet, and as a result the victim's machine assumes that there is a communication error. The attacker now knows the state of port without a full tcp connection. Major benefit of TCP SYN scan is that most logging applications do not log the TCP/RST by default.
Options
PORTS
This is the list of TCP ports to test on each host. Formats like 1-3
, 1,2,3
, 1,2-3
, etc. are all supported. Default options is to scan 1-10000
ports.
TIMEOUT
Maximum time to wait for a response. The default value is 500 milliseconds.
VERBOSE
Gives detailed message about the scan of all the ports. It also shows the ports that were closed.
Verification Steps
Do:
use auxiliary/scanner/portscan/syn
Do:
set RHOSTS [IP]
Do:
set PORTS [PORTS]
Do:
run
If any of the TCP ports were open they will be discovered, status will be printed indicating as such.