nmap

 


nmap is used scan large networks to determine which hosts are up and what services they are offering. It supports the following scanning techniques:

  1. UDP
  2. TCP connect()
  3. TCP SYN (half open)
  4. ftp proxy (bounce attack)
  5. Reverse-ident
  6. ICMP (ping sweep)
  7. FIN
  8. ACK sweep
  9. Xmas Tree
  10. SYN sweep
  11. IP Protocol
  12. Null scan

nmap also supports

  1. Remote OS detection via TCP/IP fingerprinting
  2. Stealth scanning
  3. Dynamic delay and retransmission calculations
  4. Parallel scanning
  5. Detection of down hosts via parallel pings
  6. Decoy scanning
  7. port filtering detection
  8. Direct (non-portmapper) RPC scanning
  9. Fragmentation scanning
  10. Flexible target and port specification.