11 Window Scan, RPC Scan, List Scan [-sW, -sR, -sL]

The TCP Window scan is similar to the ACK scan but can sometimes detectopen ports as well as filtered/unfiltered ports. This is due to anomalies in TCPWindow size reporting by some operating systems (see the Nmap manual for alist, or the nmap-hackers mailing list for the full list of susceptible OS’).


RPC Scans can be used in conjunction with other scan types to try to determineif an open TCP or UDP port is an RPC service, and if so, which program,and version numbers are running on it. Decoys are not supported with RPCscans (see section on Timing and Hiding Scans, below).List scanning simply prints a list of IPs and names (DNS resolution will beused unless the -n option is passed to Nmap) without actually pinging or scanningthe hosts.

Comments :

0 comments to “11 Window Scan, RPC Scan, List Scan [-sW, -sR, -sL]”

Post a Comment