1. Full TCP Port Scan on Target Host
Last updated
Last updated
To begin any pentest, you must discover what services the machine is running. A full TCP port scan helps uncover all active ports, even if services are running on unusual ports.
Tool Used: nmap
Chosen for its speed, versatility, and accuracy in network scanning.
-Pn
: Skip ping (Treat host as online)
-sS
: SYN scan for stealth and speed (if you are not root, run it with sudo)
-p-
: Scan all 65535 TCP ports
Hints & Tips:
Always scan all ports (-p-
) to avoid missing hidden services.
Use -Pn
if ICMP is blocked or when you treat host as online.