Discovering hosts with TCP SYN ping scans
Ping scans are used for detecting live hosts in networks. Nmap's default ping scan (-sP
) sends TCP SYN, TCP ACK, and ICMP packets to determine if a host is responding, but if a firewall is blocking these requests, it will be treated as offline. Fortunately, Nmap supports a scanning technique named the TCP SYN ping scan that is very handy to probe different ports in an attempt to determine if a host is online or at least has more permissive filtering rules.
This recipe will talk about the TCP SYN ping scan and its related options.
How to do it...
Open your terminal and enter the following command:
# nmap -sn -PS <target>
You should see the list of hosts found in the target range using TCP SYN ping scanning:
# nmap -sn -PS 192.1.1/24
Nmap scan report for 192.168.0.1
Host is up (0.060s latency).
Nmap scan report for 192.168.0.2
Host is up (0.0059s latency).
Nmap scan report for 192.168.0.3
Host is up (0.063s latency).
Nmap...