TCP SYN Ping
The -PS option performs a TCP SYN ping.
Usage syntax: nmap -PS[port1,port1,etc] [target]
The TCP SYN ping sends a SYN packet to the target system and listens for a response.
This alternative discovery method is useful for systems that are configured to block
standard ICMP pingsNote
.
Note
The default port for -PS is 80, but others can be specified using the
following syntax: nmap -PS22,25,80,443,etc.
The -PS option performs a TCP SYN ping.
Usage syntax: nmap -PS[port1,port1,etc] [target]
# nmap -PS scanme.insecure.orgPerforming a TCP SYN ping
Starting Nmap 5.00 ( http://nmap.org ) at 2009-08-16 13:31 CDT
Interesting ports on scanme.nmap.org (64.13.134.52):
Not shown: 995 filtered ports
PORT STATE SERVICE
53/tcp open domain
70/tcp closed gopher
80/tcp open 113/tcp closed auth
http
31337/tcp closed Elite
Nmap done: 1 IP address (1 host up) scanned in 27.41 seconds
The TCP SYN ping sends a SYN packet to the target system and listens for a response.
This alternative discovery method is useful for systems that are configured to block
standard ICMP pingsNote
.
Note
The default port for -PS is 80, but others can be specified using the
following syntax: nmap -PS22,25,80,443,etc.