![](https://www.yeahhub.com/wp-content/uploads/2019/06/nmap-commands.png)
One may be curious to understand how the network intruder to know what ports are open on a computer? Or maybe how they detect which services are running in the system that too…
Read more![](https://www.yeahhub.com/wp-content/uploads/2018/09/nmap-commonly-used-commands.jpg)
Nmap supports many scanning technologies, such as: UDP, TCP connect(), TCP SYN (half-open scan), ftp proxy (bounce attack), reverse flag, ICMP, FIN, ACK scan, Xmas Tree, SYN Scan and null scan. Nmap also…
Read more