Member-only story

Understanding Nmap Scan with Wireshark

Vijay Kumar Gupta
10 min readAug 29, 2024

--

In this article, you will learn how to capture network packet using Wireshark when an attacker is scanning target using NMAP port scanning method. Here you will notice that how Wireshark captured different network traffic packet for open and close ports.

Note: The Below Practical is performed with the IP address

192.168.43.251 = Metasploitable 2 Machine (Target)

192.168.43.72 = Attacker (Kali)

Download Metasploitable 2 Machine

https://download.vulnhub.com/metasploitable/metasploitable-linux-2.0.0.zip

TCP Scan

Tcp scan will scan for TCP port like port 22, 21, 23, 445 etc and ensure for listening port (open) through 3-way handshake connection between the source and destination port. If the port is open then source made request with SYN packet, a response destination sent SYN, ACK packet and then source sent ACK packets, at last source again sent RST, ACK packets.

Type following NMAP command for TCP scan as well as start Wireshark on another hand to capture the sent Packet.

nmap -sT -p 445 192.168.43.251

--

--

Vijay Kumar Gupta
Vijay Kumar Gupta

Written by Vijay Kumar Gupta

Vijay Gupta is an inspiring public speaker and social entrepreneur who has dedicated his life to bringing about positive change and empowering communities.

No responses yet