![Applied Network Security](https://wfqqreader-1252317822.image.myqcloud.com/cover/244/36701244/b_36701244.jpg)
上QQ阅读APP看书,第一时间看更新
Scan using TCP connect
This is the command to scan using the TCP connect option. If a user does not have raw packet privileges, this is the command they will use:
nmap -sT 192.168.0.9
![](https://epubservercos.yuewen.com/D25FBE/19470410008969906/epubprivate/OEBPS/Images/image_02_011-1.jpg?sign=1739223899-ImRro3xGxd1IU2sFA74WjrTPugNIqxVV-0-ec8c410088673740ef884c7dd578fd4f)
Privileged access is necessary to perform the default SYN scans. If privileges are not sufficient, a TCP connect scan will be used. A TCP connect scan needs a full TCP connection to be established, and is known to be a slower scan than SYN scans. Disregarding discovery is often required as many firewalls or hosts will not answer to ping, so it could be missed, unless you choose the -Pn parameter. Of course, this can make the scan times much longer as you could end up sending scan probes to hosts that are not even there.