LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Networking
User Name
Password
Linux - Networking This forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.

Notices


Reply
  Search this Thread
Old 05-09-2008, 10:29 AM   #31
meetscott
Samhain Slackbuild Maintainer
 
Registered: Sep 2004
Location: Phoenix, AZ, USA
Distribution: Slackware
Posts: 411

Rep: Reputation: 43

From my man page:

-sT (TCP connect scan)
TCP connect scan is the default TCP scan type when SYN scan is not an option. This is the case when a user does not have raw
packet privileges or is scanning IPv6 networks. Instead of writing raw packets as most other scan types do, Nmap asks the
underlying operating system to establish a connection with the target machine and port by issuing the connect() system call.
This is the same high-level system call that web browsers, P2P clients, and most other network-enabled applications use to
establish a connection. It is part of a programming interface known as the Berkeley Sockets API. Rather than read raw packet
responses off the wire, Nmap uses this API to obtain status information on each connection attempt.

When SYN scan is available, it is usually a better choice. Nmap has less control over the high level connect() call than with
raw packets, making it less efficient. The system call completes connections to open target ports rather than performing the
half-open reset that SYN scan does. Not only does this take longer and require more packets to obtain the same information,
but target machines are more likely to log the connection. A decent IDS will catch either, but most machines have no such
alarm system. Many services on your average UNIX system will add a note to syslog, and sometimes a cryptic error message,
when Nmap connects and then closes the connection without sending data. Truly pathetic services crash when this happens,
though that is uncommon. An administrator who sees a bunch of connection attempts in her logs from a single system should
know that she has been connect scanned.


-sR (RPC scan)
This method works in conjunction with the various port scan methods of Nmap. It takes all the TCP/UDP ports found open and
floods them with SunRPC program NULL commands in an attempt to determine whether they are RPC ports, and if so, what program
and version number they serve up. Thus you can effectively obtain the same info as rpcinfo -p even if the target's portmapper
is behind a firewall (or protected by TCP wrappers). Decoys do not currently work with RPC scan. This is automatically
enabled as part of version scan (-sV) if you request that. As version detection includes this and is much more comprehensive,
-sR is rarely needed.


A good technique when viewing man pages it to use vi editing constructs to search for options. For example, /-sR will search for instances of "-sR" in the man page, just like searching for text in the document. I have to confess, I cheated on producing that command. There's a graphical program called nmapfe that makes selecting options a snap. The same options can be used at the command line. I often do this because I logged in as a regular user and I can't do what I need to except as root. So I just use the commands produced by nmapfe in a console window where I'm logged in as root.

By the way, Debian/Ubuntu might use info pages for some of this. I really don't know. That might be why you can't find man pages on nmap.
 
Old 05-12-2008, 08:08 AM   #32
green_dood
Member
 
Registered: Nov 2007
Location: Puebla, Mexico
Distribution: Ubuntu, DSL, Fedora
Posts: 45
Blog Entries: 1

Rep: Reputation: 15
I have been thinking, maybe I should find out HOW the hell is that firewall selectively blocking my connections in port 80. I can't figure out how that firewall detects I am using port 80 to make a tunnel

Any suggested approach?
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
HTTP Tunneling zeeple Linux - Networking 8 04-19-2007 09:11 AM
HTTP Tunneling or VPN Tunneling Teomari Linux - Networking 3 04-09-2007 07:52 PM
Http Tunneling mylo2003 Linux - Networking 18 11-24-2004 01:54 PM
HTTP tunneling NNP Linux - Networking 2 11-18-2004 07:35 AM
http tunneling ngo Linux - Networking 0 10-02-2001 10:24 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Networking

All times are GMT -5. The time now is 03:52 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration