Course Overview

/

SYN Scanning

SYN Scanning

The syntax to trigger a SYN Scan is:

nmap -sS <IP address>

If no scan type is selected, nmap will default to a SYN Scan. Alternatively it can be explicitly triggered with the -sS flag. SYN Scans do not conduct a full TCP 3 way handshake when port scanning, instead nmap will send a SYN packet, and look at the response. If a SYN-ACK packet is returned, the port is open. If a RST packet is returned, the port is closed. As this does not follow the standard use of the TCP protocol, only a privileged user can trigger a SYN Scan as nmap will require the ability to manipulate the raw packets.

Due to the fact that a SYN Scan never completes a TCP connection, it is sometimes referred to as a half-open scan (the handshake is never completed) or stealth scan (due to not completing the connection, there are no connection logs created).