Skip to content

Commit 8138396

Browse files
authored
Update syn.md
1 parent 35ecc82 commit 8138396

File tree

1 file changed

+7
-13
lines changed
  • documentation/modules/auxiliary/scanner/portscan

1 file changed

+7
-13
lines changed

documentation/modules/auxiliary/scanner/portscan/syn.md

Lines changed: 7 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
## Description
22

3-
This module will attempt to initiate a three-way handshake with every
4-
on the victim machine. It is done by sending a SYN packet and if victim replies with a SYN/ACK packet that means the port is open. Then the attacker sends a RST packet as a result
3+
This module will attempt to initiate a TCP/IP connection with every possible port on the victim machine. It is done by sending a SYN packet and if victim replies with a SYN/ACK packet that means the port is open. Then the attacker sends a RST packet as a result victim's machine assumes that there is a communication error. So attacker now knows the state of port without a full tcp connection. Major benefit of TCP SYN scan is that most logging applications do not log the TCP/RST by default.
54

65
## Vulnerable Application
76

@@ -11,31 +10,26 @@ on the victim machine. It is done by sending a SYN packet and if victim replies
1110

1211
**PORTS**
1312

14-
This is the list of ports to test for TCP Scan on each host.
15-
Formats like `1-3`, `1,2,3`, `1,2-3`, etc. are all supported.Default
13+
This is the list of TCP ports to test on each host.
14+
Formats like `1-3`, `1,2,3`, `1,2-3`, etc. are all supported. Default
1615
options is to scan `1-10000` ports.
1716

1817
**TIMEOUT**
1918

20-
Maximum time (seconds) to wait for a response. The default value is 500.
21-
22-
**ConnectTimeout**
19+
Maximum time to wait for a response. The default value is 500 milliseconds.
2320

24-
This options states the maximum number of seconds to establish a tcp
25-
connection. Default value if 10.
26-
2721
**VERBOSE**
2822

2923
Gives detailed message about the scan of all the ports. It also shows the
3024
ports that were closed.
3125

3226
## Verification Steps
3327

34-
1. Do: `use auxiliary/scanner/portscan/tcp`
28+
1. Do: `use auxiliary/scanner/portscan/syn`
3529
2. Do: `set RHOSTS [IP]`
36-
3. Do: `set RPORT [PORTS]`
30+
3. Do: `set RPORTS [PORTS]`
3731
4. Do: `run`
38-
5. If any of the TCP ports were open they will be discovered, status will be printed indicated as such.
32+
5. If any of the TCP ports were open they will be discovered, status will be printed indicating as such.
3933

4034
## Scenarios
4135

0 commit comments

Comments
 (0)