

The higher the speed of the scan the more aggressive it is deemed. Scan speeds designations start at T0 and span to T5. Understandably, scans that need to avoid IDS alerts are slower.

Nmap has an option to define the speed and thoroughness of the scan. Scanning a large number of hosts is a time-consuming process. To run a TCP SYN scan, use the command: sudo nmap -sS 185.52.53.222 Nmap: Scan Speed, Aggression, and Verbosity Scan Speed Since this type of scan never completes TCP connections, it is often referred to as half-open scanning. Initiate TCP SYN for a fast and unobtrusive scan. This command scans ports 80 and 443 for the defined host. The -p option allows you to specify port ranges and sequences: sudo nmap –p 80,443 185.52.53.222 It also offers options for specifying which ports are to be scanned, and whether the scan is random or ordered.


Instead of scanning individual IPs, scan a whole IP range by defining it in your command line: sudo nmap 185.52.53.2-222 To obtain general information of a remote system type: sudo nmap target_IP or Note: It is important to emphasize that aggressive port scanning to find open ports without permission can be interpreted as malicious by third-party organizations.
