This is the tenth post detailing my notes on Nmap Network Scanning.
We can design our own scans using arbitrary TCP flags which may help in evading intrusion detection.
The options are: URG, ACK, PSH, RST, SYN, FIN.
The above book suggests mixing up SYN/FIN
~# nmap –scanflags SYN/FIN scanme.nmap.org
Starting Nmap 6.25 ( http://nmap.org ) at 2013-07-05 10:20 BST
Nmap scan report for scanme.nmap.org (74.207.244.221)
Host is up (0.0096s latency).
Not shown: 998 closed ports
PORT STATE SERVICE
554/tcp filtered rtsp
7070/tcp filtered realserverNmap done: 1 IP address (1 host up) scanned in 3.87 seconds