![Applied Network Security](https://wfqqreader-1252317822.image.myqcloud.com/cover/244/36701244/b_36701244.jpg)
上QQ阅读APP看书,第一时间看更新
Scan using TCP connect
This is the command to scan using the TCP connect option. If a user does not have raw packet privileges, this is the command they will use:
nmap -sT 192.168.0.9
![](https://epubservercos.yuewen.com/D25FBE/19470410008969906/epubprivate/OEBPS/Images/image_02_011-1.jpg?sign=1738752148-NMmhNk6tO5ezmcfsRcrbc15xL6uXAoka-0-9d7716cd1dc530378e4626913c2abead)
Privileged access is necessary to perform the default SYN scans. If privileges are not sufficient, a TCP connect scan will be used. A TCP connect scan needs a full TCP connection to be established, and is known to be a slower scan than SYN scans. Disregarding discovery is often required as many firewalls or hosts will not answer to ping, so it could be missed, unless you choose the -Pn parameter. Of course, this can make the scan times much longer as you could end up sending scan probes to hosts that are not even there.