Stealth scanning with Metasploit

Metasploit has an auxiliary module that can be used to perform SYN scans on specified TCP ports:

  1. To open up Metasploit in Kali Linux, we use the msfconsole command in a Terminal session, as follows:
  1. To run the SYN scan module in Metasploit, call the use command with the relative path of the auxiliary module. Once the module has been selected, the show options command can be used to identify and/or modify scan configurations. This command will display four column headers to include Name, Current Setting, Required, and Description. The Name column identifies the name of each configurable variable. The Current ...

Get Kali Linux Network Scanning Cookbook - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.