You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: documentation/modules/auxiliary/scanner/portscan/syn.md
+7-13Lines changed: 7 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,6 @@
1
1
## Description
2
2
3
-
This module will attempt to initiate a three-way handshake with every
4
-
on the victim machine. It is done by sending a SYN packet and if victim replies with a SYN/ACK packet that means the port is open. Then the attacker sends a RST packet as a result
3
+
This module will attempt to initiate a TCP/IP connection with every possible port on the victim machine. It is done by sending a SYN packet and if victim replies with a SYN/ACK packet that means the port is open. Then the attacker sends a RST packet as a result victim's machine assumes that there is a communication error. So attacker now knows the state of port without a full tcp connection. Major benefit of TCP SYN scan is that most logging applications do not log the TCP/RST by default.
5
4
6
5
## Vulnerable Application
7
6
@@ -11,31 +10,26 @@ on the victim machine. It is done by sending a SYN packet and if victim replies
11
10
12
11
**PORTS**
13
12
14
-
This is the list of ports to test for TCP Scan on each host.
15
-
Formats like `1-3`, `1,2,3`, `1,2-3`, etc. are all supported.Default
13
+
This is the list of TCP ports to test on each host.
14
+
Formats like `1-3`, `1,2,3`, `1,2-3`, etc. are all supported.Default
16
15
options is to scan `1-10000` ports.
17
16
18
17
**TIMEOUT**
19
18
20
-
Maximum time (seconds) to wait for a response. The default value is 500.
21
-
22
-
**ConnectTimeout**
19
+
Maximum time to wait for a response. The default value is 500 milliseconds.
23
20
24
-
This options states the maximum number of seconds to establish a tcp
25
-
connection. Default value if 10.
26
-
27
21
**VERBOSE**
28
22
29
23
Gives detailed message about the scan of all the ports. It also shows the
30
24
ports that were closed.
31
25
32
26
## Verification Steps
33
27
34
-
1. Do: `use auxiliary/scanner/portscan/tcp`
28
+
1. Do: `use auxiliary/scanner/portscan/syn`
35
29
2. Do: `set RHOSTS [IP]`
36
-
3. Do: `set RPORT [PORTS]`
30
+
3. Do: `set RPORTS [PORTS]`
37
31
4. Do: `run`
38
-
5. If any of the TCP ports were open they will be discovered, status will be printed indicated as such.
32
+
5. If any of the TCP ports were open they will be discovered, status will be printed indicating as such.
0 commit comments