![zenmap overview zenmap overview](https://www.maketecheasier.com/assets/uploads/2014/01/zenmap-after-regular-scan.jpg)
The user can easily find the live hosts with this scan and it is also very fast and the results can be fetched in various formats easily. It is very important in network reconnaissance to find out live hosts to narrow our search and this scan is where Nmap pings all the IP addresses to check which IP address responds to an ICMP request. This scan is mostly focused on finding the zombie for us and using the zombie to make the scan for us. This scan uses a zombie between the attacker and the target, so that if a network firewall finds the attack incoming then the zombie is the one to be blamed but not the attacker.
![zenmap overview zenmap overview](https://geek-university.com/wp-content/uploads/2016/03/install_nmap_windows_2.jpg)
This scan can be basically called the Stealth scan. The responses are slower but it’s always better to be cautious to protect our UDP layer.
#Zenmap overview windows#
This scan is mostly used for the windows systems to find if an UDP layer is open to vulnerability attacks or not. But, you must also be careful not to overload the systems with TCP packets. The network logging systems can easily find TCP scans but this is also more accurate.
#Zenmap overview full#
The difference is that the full scan is done by sending the ACK packets back. This is similar to the SYN Scan in various ways but with a tiny little bit of difference. This scan is not shown in most of the scan logs and hence it is safe to use SYN scan to identify the ports. No response signifies that the port is either closed or not available. If an acknowledgement packet or ACK is received back to the system, it is sure that a port is opened there. It sends an SYN packet via TCP to all the required ports. This is the most useful type of Nmap scan because it does its work silent. We can launch scans against an IP address or CIDR and learn a significant amount of information about our target’s network. This can be done by using different scan types available in Nmap. Nmap is basically a network scanner designed to find details about a network system and the protocols running on it. Nmap is a must-to-have tool for network reconnaissance. Using passive and active reconnaissance tools and technique ,an attacker can hold large amounts of information with less probability of detection. Knowing more information about the target’s network will let us know about the target’s infrastructure and will let us know any potential attack vectors and exploits leading to vulnerabilities. Network reconnaissance is a critical part of any network pentesting operation.