TCP Window Scan on Nmap
To view the TCP Window on the Nmap, open your terminal and then type in the following command:
nmap -sW -T4 (Any TCP Stream you want to search)
For example:
TCP Window Scan
TCP Window Scan is a new and exciting way to find out what is happening on your network from the outside. TCP Window Scan is performed by the administrators of a network, typically one that works for a large company, who are trying to determine if their network can be compromised in any way by hackers or other unethical individuals. Users of TCP window scan type in what IP address they want to be scanned and then other than that it goes around and checks every port on every machine it finds. When it finds a machine with a port open, it sends information about that port back to the person who initiated the scan. If a port is found in this way, that means there is some sort of program running on that computer. This is one way to find out if someone has used an FTP program or server to access files from your network. It can also be used to find out if someone has tried to get access to your network by using various exploits, like SMB or RDP. In the past hackers were able to gain access to networks through various exploits and by guessing username/password combinations. TCP window scans can determine if someone has used various exploits or other methods to guess valid usernames and passwords.
Contact Us