The default Nmap scan type is the TCP Connect Scan (-sT). This scan attempts to establish a full TCP connection with the target ports by completing the TCP handshake (SYN, SYN-ACK, ACK).
Key Features of TCP Connect Scan:
- Full Connection: It establishes a complete connection, which means it is easily detectable by the target system.
- Permission Required: Since it completes the handshake, it typically requires permission to connect to the target.
- Simplicity: It is straightforward and works on any system without needing special privileges.
Example Command
To perform a default TCP Connect scan, you can simply run:
nmap target-ip-address
This command will scan the most common 1,000 TCP ports on the specified target using the TCP Connect scan method.
If you have any more questions about Nmap or scanning techniques, feel free to ask!
