To access material, start machines and answer questions login.
This room is the third in the series (part of the Introduction to Network Security module). In the first two rooms, we learned about live host discovery and basic port scans.
In Basic Port Scans, we covered flags and reviewed the 3-way handshake. To initiate a connection, requires the first packet to have the SYN flag set. Consequently, we can tell if a port is open based on the response we receive.
Security researchers and hackers contemplated the flags, shown in the figure below and explained in the previous room, and started to experiment. They wanted to know what would happen if we send a packet, which is not part of any ongoing connection, with one or more flags set.

For instance, an ACK flag is set when you want to acknowledge received data. An ACK scan is like trying to acknowledge data that was neither sent nor received in the first place. Consider this simple analogy, someone coming to you out of nowhere to tell you, “yes, I hear you, please continue.” when you haven’t said anything.
This room explains advanced types of scans and scan options. Some of these scan types can be useful against specific systems, while others are useful in particular network setups. We will cover the following types of port scans:
- Null Scan
- FIN Scan
- Xmas Scan
- Maimon Scan
- ACK Scan
- Window Scan
- Custom Scan
Moreover, we will cover the following:
- Spoofing IP
- Spoofing MAC
- Decoy Scan
- Fragmented Packets
- Idle/ Scan
We will discuss options and techniques to evade firewalls and systems. We also cover options to get more verbose details from .
Ready to learn Cyber Security?
The Nmap Advanced Port Scans room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
