1. Full TCP Port Scan on Target Host

1. Full TCP Port Scan on Target Host

To begin any pentest, you must discover what services the machine is running. A full TCP port scan helps uncover all active ports, even if services are running on unusual ports.

Tool Used: nmap

Chosen for its speed, versatility, and accuracy in network scanning.

nmap -Pn -sS -p- 192.168.10.4
  • -Pn: Skip ping (Treat host as online)

  • -sS: SYN scan for stealth and speed (if you are not root, run it with sudo)

  • -p-: Scan all 65535 TCP ports

Hints & Tips:

  1. Always scan all ports (-p-) to avoid missing hidden services.

  2. Use -Pn if ICMP is blocked or when you treat host as online.



Last updated