Nmap Development mailing list archives
RE: options -sn not just pinging
From: Christopher C Thornton <christopher.thornton () dteenergy com>
Date: Tue, 18 Apr 2017 21:28:03 +0000
Interesting because the description says "Ping Scan" And it never reports responses from ports 443 and 80 "-sn: Ping Scan - disable port scan" If it sends probes to 443 and 80 on purpose why does it not report them as being open in the output? What would be the use of that? -----Original Message----- From: David Fifield [mailto:david () bamsoftware com] Sent: Tuesday, April 18, 2017 5:20 PM To: Christopher C Thornton <christopher.thornton () dteenergy com> Cc: dev () nmap org Subject: Re: options -sn not just pinging On Mon, Apr 17, 2017 at 09:17:55PM +0000, Christopher C Thornton wrote:
When I run this scan nmap -sn 192.168.9.0/25 nmap pings the address range (expected result ) but it also sends syn packets to tcp port 443 on each of the IP’s And it sends ack packets to port 80
-sn doesn't mean "ping scan"; it means "host discovery only." The default host discovery sends four probes: ICMP echo TCP SYN to port 443 TCP ACK to port 80 ICMP timestamp request If you only want ICMP echo, do -sn -PE.
_______________________________________________ Sent through the dev mailing list https://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- options -sn not just pinging Christopher C Thornton (Apr 18)
- Re: options -sn not just pinging David Fifield (Apr 18)
- RE: options -sn not just pinging Christopher C Thornton (Apr 19)
- Re: options -sn not just pinging Daniel Miller (Apr 19)
- Re: options -sn not just pinging David Fifield (Apr 18)