Practical Scan Techniques
Advanced Scanning Strategies
Comprehensive Network Mapping
graph LR
A[Network Scanning] --> B[Host Discovery]
A --> C[Port Enumeration]
A --> D[Service Detection]
A --> E[Vulnerability Assessment]
Essential Scanning Techniques
1. Host Discovery Techniques
## ICMP Ping Scan
nmap -sn 192.168.1.0/24
## TCP SYN Discovery
nmap -sn -PS22,80,443 192.168.1.0/24
## UDP Discovery
nmap -sn -PU53,67 192.168.1.0/24
2. Port Scanning Methods
Scan Type |
Command |
Purpose |
SYN Stealth |
nmap -sS |
Minimal detection risk |
Connect Scan |
nmap -sT |
Full TCP connection |
UDP Scan |
nmap -sU |
Detect UDP services |
3. Service and Version Detection
## Comprehensive service version detection
nmap -sV -p- 192.168.1.100
## Aggressive service detection
nmap -sV --version-intensity 8 192.168.1.100
Advanced Scanning Scenarios
Scripting Engine Techniques
## Network vulnerability scanning
nmap --script vuln 192.168.1.0/24
## Detailed service enumeration
nmap --script discovery 192.168.1.100
## Parallel scanning
nmap -T4 -p- 192.168.1.0/24
## Specify network interface
nmap -e eth0 192.168.1.0/24
Security and Compliance Scanning
Firewall and IDS Evasion
## Fragmented packets
nmap -f 192.168.1.100
## Decoy scanning
nmap -D RND:10 192.168.1.100
Specialized Scanning Techniques
1. OS Detection
## Aggressive OS fingerprinting
nmap -O --osscan-guess 192.168.1.100
2. Custom Port Ranges
## Scan specific port ranges
nmap -p 20-80 192.168.1.100
## Exclude specific ports
nmap -p ^80,443 192.168.1.0/24
Best Practices
- Always obtain proper authorization
- Use minimal privileges
- Respect network policies
- Document scanning activities
Output and Reporting
## Generate multiple output formats
nmap -oN normal.txt -oX xml_report.xml 192.168.1.100
Practical Considerations
- Understand legal implications
- Use scanning techniques responsibly
- Continuously update scanning knowledge
LabEx recommends practicing these techniques in controlled, ethical environments to develop robust network reconnaissance skills.