Securing Network Infrastructure
上QQ阅读APP看书,第一时间看更新

How it works…

These options help the user to streamline their requirement to identify the open ports and thus perform further attacks. Using these different port scan options, a user can target a specific port and protocol to obtain the current status of the port. Further reconnaissance can be performed on the port by obtaining the exact service name and the version, which we will see in further sections of the book.