Network Mapper (Nmap) is a popular, effective open-source network scanning and inspection tool. It is intended to find hosts and services on a computer network to create a network map. Nmap has a variety of scanning techniques, including TCP, UDP, SYN, ACK, and ICMP scans.
A stealth scan is a scanning technique in Nmap that seeks to minimize the detection of scanning activity by the target host's firewalls and other security measures.
The default SYN scan is also known as a stealth scan. This is due to the SYN scan failing to complete the
Note: The SYN scan alone does not guarantee perfect stealth mode. To reduce the possibility of notifying the target host, extra flags must be included in combination with the scan.
The -sS
flag is used to perform the default SYN scan or stealth scan on target.
nmap -sS <Server name/IP address of a server>
We can either add the name of the server or the IP address of the server just after the -sS
flag.
Let's investigate the Nmap official testing server (i.e., scanme.nmap.org
) using Nmap's stealth scan in the following terminal.
As we can see from the result, stealth scan provides information on open ports and associated services.
Free Resources