Nmap - Inverse TCP Flag Scanning (FIN, XMAS & NULL)

แชร์
ฝัง
  • เผยแพร่เมื่อ 26 พ.ค. 2020
  • In this video, I demonstrate how to perform inverse TCP flag scanning with Nmap through the use of FIN, XMAS and Null scans. Nmap is a free and open-source network scanner created by Gordon Lyon. Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses. Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection.
    📈 SUPPORT US:
    Patreon: / hackersploit
    Merchandise: teespring.com/en-GB/stores/ha...
    SOCIAL NETWORKS:
    Reddit: / hackersploit
    Twitter: / hackersploit
    Instagram: / hackersploit
    LinkedIn: / 18713892
    WHERE YOU CAN FIND US ONLINE:
    Blog: hsploit.com/
    HackerSploit - Open Source Cybersecurity Training: hackersploit.org/
    HackerSploit Academy: www.hackersploit.academy
    HackerSploit Discord: / discord
    LISTEN TO THE CYBERTALK PODCAST:
    Spotify: open.spotify.com/show/6j0RhRi...
    We hope you enjoyed the video and found value in the content. We value your feedback. If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
    Thanks for watching!
    Благодарю за просмотр!
    Kiitos katsomisesta
    Danke fürs Zuschauen!
    感谢您观看
    Merci d'avoir regardé
    Obrigado por assistir
    دیکھنے کے لیے شکریہ
    देखने के लिए धन्यवाद
    Grazie per la visione
    Gracias por ver
    شكرا للمشاهدة
    #Nmap
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 33

  • @zoozeezoozee6726
    @zoozeezoozee6726 3 ปีที่แล้ว

    Great information tutorial as always sir. This video explained a lot for me. I was confused in these three command

  • @bread-mp5kx
    @bread-mp5kx 4 ปีที่แล้ว +2

    Thanks i was needing this recently and there were no gud tutorials

  • @JCBATTAGLINI
    @JCBATTAGLINI 2 ปีที่แล้ว

    excellent, i was having trouble to understanding it by my self, but wow, with your help it was easy to understand, thanks you berry much

  • @rayf3937
    @rayf3937 4 ปีที่แล้ว +3

    Thanks for sharing the knowledge

  • @mylearnchannel9473
    @mylearnchannel9473 2 ปีที่แล้ว

    Incredible content, bravo

  • @sixteen7640
    @sixteen7640 3 ปีที่แล้ว

    great job explaining....

  • @TimVerdouw-itmobilesupport
    @TimVerdouw-itmobilesupport 3 ปีที่แล้ว

    Very helpful. Thanks.

  • @Echo-kw1sp
    @Echo-kw1sp 3 ปีที่แล้ว

    It's working on my Windows ❤️

  • @eswaranexpert6284
    @eswaranexpert6284 ปีที่แล้ว

    you are simplicity instructor sir!!!!!!!

  • @Partida2012
    @Partida2012 2 ปีที่แล้ว

    Thank you so much. You bring the content I read to life through practice. It's great people like you that facilitate learning to be fun, easy, and understandable. Thus, I continue to move forward with my skill set. Couldn't/Wouldn't have done it without these kinds of videos. Blessings to you, sir.

  • @sarathg3124
    @sarathg3124 4 ปีที่แล้ว +1

    Great one :)

  • @Skaxarrat
    @Skaxarrat ปีที่แล้ว

    Thansk for the video, the explanation and the demonstration. But there is a thing I don't fully understand: If we get the same message when using Null, FIN and Xmas scans, when should use FIN instead of Null, or Null instead of Xmas? We have 3 options, which one is better?

  • @hackersguild8445
    @hackersguild8445 ปีที่แล้ว

    Amazing. Thanks a lot

  • @flexflex8441
    @flexflex8441 2 ปีที่แล้ว

    Does the machine from which i run namp has to be in the same subnet? When a firewall only permitts connection to ports that are running on the target host, and only these ports are open - the firewall could drop all packages that are not addressed to one of the "correct" ports. Then the result is not really the same?

  • @OneKickboxing
    @OneKickboxing 2 ปีที่แล้ว

    Top video. Subbed.

  • @pro.op1
    @pro.op1 4 ปีที่แล้ว +1

    Thanks 🙏

  • @chiragvyas5720
    @chiragvyas5720 ปีที่แล้ว +1

    why we use this flags in nmap scan?

  • @SnapcrackerzTeam
    @SnapcrackerzTeam 4 ปีที่แล้ว +1

    Nice

  • @SumitSingh-xu4qs
    @SumitSingh-xu4qs 3 ปีที่แล้ว

    thanks sr again

  • @8080VB
    @8080VB 3 ปีที่แล้ว

    Yo reallyy thanks 💫

  • @mahamaatir7755
    @mahamaatir7755 11 หลายเดือนก่อน

    It shows host is down .. why?

  • @angel123456799
    @angel123456799 3 ปีที่แล้ว

    At 5.54, u say that the port is closed if we receive an ACK or RST. If we get an ACK, the port is open right?

    • @8080VB
      @8080VB 3 ปีที่แล้ว +1

      Look , If you get [ RST, ACK ] after [ SYN ] its actually closed
      If you get [ RST , ACK ] after [ ACK ] , then its open.

  • @AhmedAbdullah-pp2mp
    @AhmedAbdullah-pp2mp 4 ปีที่แล้ว

    👌

  • @cagr21
    @cagr21 3 ปีที่แล้ว

    #bypass #firewall

  • @onlinesupport6611
    @onlinesupport6611 4 ปีที่แล้ว

    Wassup Hakers!!!

    • @Robert_777
      @Robert_777 4 ปีที่แล้ว +1

      wassup supporter

  • @ThriveTalesTV
    @ThriveTalesTV 4 ปีที่แล้ว +1

    447K subscribers 1.2003 views after 20 hours 13 comments and 110 likes . Hmm .

    • @saltysexyyy6336
      @saltysexyyy6336 4 ปีที่แล้ว +2

      this happens when you make a tutorial and stuff like that people only watch the videos they are interested in , nothing fishy.

  • @harze6818
    @harze6818 2 ปีที่แล้ว

    why would this be helpfull? we cant see any versions or anything we only see which service is open or firewalled?

    • @charlesnathansmith
      @charlesnathansmith ปีที่แล้ว +2

      You can go back and selectively explore them. This way you're not blasting the host with SYN packets that are going to be ringing alarm bells.
      Even if you can't establish an external connection to a port, knowing it's open could be immensely valuable if you find a way to proxy to it later. And beyond that, just being able to map out the internal layout of a network and understanding the firewall's setup could always prove useful later