In addition to the discovery techniques that we've learned, the hping3 command can also be used to perform port scans. This specific recipe demonstrates how we can use the hping3 command to perform a TCP stealth scan.
Port scanning with hping3 (stealth)
Getting ready
To use the hping3 command to perform a TCP stealth scan, you will need to have a remote system that is running accessible network services over TCP. In the examples provided, an instance of Metasploitable2 is used to perform this task. For more information on how to set up Metasploitable2, refer to Chapter 1, Getting Started.
How to do it...
In addition...