How it works…

These options help the user to streamline their requirement to identify the open ports and thus perform further attacks. Using these different port scan options, a user can target a specific port and protocol to obtain the current status of the port. Further reconnaissance can be performed on the port by obtaining the exact service name and the version, which we will see in further sections of the book.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.116.239.195