In this write-up, I walk you through the Nmap Basic Port Scans room in TryHackMe. I go in-depth on how nmap TCP connect scan, TCP SYN port scan, and UDP port scan work.

Introduction

This room is the second in the Nmap series (part of the Introduction to Network Security module).

  1. Nmap Live Host DiscoveryCheck out my write-up for this room: https://medium.com/@oluwakamiye/nmap-series-nmap-live-host-discovery-part-1-5bab2c45f5de
  2. Nmap Basic Port Scans
  3. Nmap Advanced Port Scans
  4. Nmap Post Port Scans

In the previous room (Nmap Live Host Discovery), we focused on discovering online systems. So far, we have covered three steps of an Nmap scan:

  1. Enumerate targets
  2. Discover live hosts
  3. Reverse-DNS lookup
None

Learning Objectives

The next step would be to check which ports are open and listening, and which are closed. Therefore, in this room and the next one, we focus on port scanning and the different types of port scans used by nmap. This room explains:

  1. TCP connect port scan
  2. TCP SYN port scan
  3. UDP port scan

Moreover, we discuss the options for specifying ports, the scan rate, and the number of parallel probes.

Connecting to the Machine

Please click the Start Machine button to boot up the VM and Start AttackBox to start the AttackBox. It will take approximately 1-2 minutes to load and warm up all the services. You will need the VM in Task 4, so by the time you reach that task, the VM will be fully ready for use.

TCP and UDP Ports

In the same way that an IP address specifies a host on a network among many others, a TCP or UDP port identifies a network service running on that host. A server provides a network service and adheres to a specific network protocol. Examples include providing time, responding to DNS queries, and serving web pages. A port is usually linked to a service using that specific port number. For instance, an HTTP server would bind to TCP port 80 by default; if it supports SSL/TLS, it would also listen on TCP port 443. (TCP ports 80 and 443 are the default ports for HTTP and HTTPS; however, the web server administrator might choose other port numbers if necessary.) Furthermore, no more than one service can listen on any TCP or UDP port (on the same IP address).

None

At the risk of oversimplification, we can classify ports into two states:

  1. An open port indicates that a service is listening on that port.
  2. A closed port indicates that no service is listening on that port.

However, in practical situations, we need to consider the impact of firewalls. For instance, a port might be open, but a firewall might be blocking the packets. Therefore, Nmap considers the following six states:

  1. An open port indicates that a service is listening on the specified port.
  2. A closed port indicates that no service is listening on the specified port, although the port is accessible. By accessible, we mean that it is reachable and is not blocked by a firewall or other security appliances/programs.
  3. Filtered means that Nmap cannot determine whether the port is open or closed because it is not accessible. This state is usually due to a firewall preventing Nmap from reaching that port. Nmap's packets may be blocked from reaching the port; alternatively, responses may be blocked from reaching Nmap's host.
  4. Unfiltered means that Nmap cannot determine whether the port is open or closed, even though the port is accessible. This state is encountered when using an ACK scan -sA.
  5. Open|Filtered: This means that Nmap cannot determine whether the port is open or filtered.
  6. Closed|Filtered: This means that Nmap cannot decide whether a port is closed or filtered.

Q: Which service uses UDP port 53 by default?

A: DNS

Q: Which service uses TCP port 22 by default?

A: SSH

Q: How many port states does Nmap consider?

A: 6

Q: Which port state is the most interesting to discover as a pentester?

A: Open

TCP Flags

Nmap supports different types of TCP port scans. To understand the difference between these port scans, we need to review the TCP header. The TCP header is the first 24 bytes of a TCP segment. The following figure shows the TCP header as defined in RFC 793. This figure looks sophisticated at first; however, it is pretty simple to understand. In the first row, we have the source TCP port and the destination TCP port. We can see that the port number is allocated 16 bits (2 bytes). In the second and third rows, we have the sequence number and the acknowledgement number. Each row has 32 bits (4 bytes) allocated, for a total of 6 rows, making 24 bytes.

None

In particular, we need to focus on the flags that Nmap can set or unset. We have highlighted the TCP flags in red. Setting a flag bit means setting its value to 1. From left to right, the TCP header flags are:

  1. URG: Urgent flag indicates that the urgent pointer field is significant. The urgent pointer indicates that the incoming data is urgent, and that a TCP segment with the URG flag set is processed immediately, without waiting for previously sent TCP segments.
  2. ACK: Acknowledgement flag indicates that the acknowledgement number is significant. It is used to acknowledge the receipt of a TCP segment.
  3. PSH: Push flag asking TCP to pass the data to the application promptly.
  4. RST: The reset flag is used to reset the connection. Another device, such as a firewall, might send it to tear a TCP connection. This flag is also used when data is sent to a host, and there is no service on the receiving end to answer.
  5. SYN: The synchronise flag is used to initiate a TCP 3-way handshake and synchronise sequence numbers with the other host. The sequence number should be set randomly during TCP connection establishment.
  6. FIN: The sender has no more data to send.

Q: What 3 letters represent the Reset flag?

A: RST

Q: Which flag needs to be set when you initiate a TCP connection (first packet of TCP 3-way handshake)?

A: SYN

TCP Connect Scan

TCP connect scan works by completing the TCP 3-way handshake. In standard TCP connection establishment, the client sends a TCP packet with the SYN flag set, and the server responds with SYN/ACK if the port is open; finally, the client completes the 3-way handshake by sending an ACK.

None

We are interested in learning whether the TCP port is open, not in establishing a TCP connection. Hence, the connection is torn as soon as its state is confirmed by sending a RST/ACK. You can choose to run a TCP connect scan using -sT.

None

It is important to note that if you are not a privileged user (root or sudoer), a TCP connect scan is the only possible option to discover open TCP ports.

In the following Wireshark packet capture window, we see Nmap sending TCP packets with the SYN flag set to various ports, 5900, 22, 80, and so on. By default, Nmap will attempt to connect to the 1000 most common ports. A closed TCP port responds to a SYN packet with RST/ACK to indicate that it is not open. This pattern will repeat for all the closed ports as we attempt to initiate a TCP 3-way handshake with them.

None

We notice that port 80 is open, so it replied with a SYN/ACK, and Nmap completed the 3-way handshake by sending an ACK. The figure below shows all the packets exchanged between our Nmap host and the target system's port 80. The first three packets are the TCP 3-way handshake. Then the fourth packet tears it down with an RST/ACK.

None

To illustrate the -sT (TCP connect scan), Run the following command in the AB to get a detailed list of the open ports.

Terminal

root@ip-10-201-98-13:~# nmap -sT 10.112.154.61
Starting Nmap 7.80 ( https://nmap.org ) at 2026-02-10 12:16 GMT
mass_dns: warning: Unable to open /etc/resolv.conf. Try using --system-dns or specify valid servers with --dns-servers
mass_dns: warning: Unable to determine any DNS servers. Reverse DNS is disabled. Try using --system-dns or specify valid servers with --dns-servers
Nmap scan report for 10.112.154.61
Host is up (0.070s latency).
Not shown: 996 closed ports
PORT STATE SERVICE
21/tcp xxxx ftp
22/tcp open ssh
53/tcp open xxxxxx
80/tcp open http

Nmap done: 1 IP address (1 host up) scanned in 1.25 seconds

Note that we can use -F to enable fast mode and decrease the number of scanned ports from 1000 to 100 most common ports.

It is worth mentioning that the -r option can also be added to scan the ports in consecutive order instead of random order. This option is useful for testing whether ports open consistently, for instance, when a target boots up.

Q: What is the state of the FTP service running on port 21?

A: open

Q: What is Nmap's guess about the service running on port 53?

A: domain

TCP SYN Scan

Unprivileged users are limited to the connect scan. However, the default scan mode is a SYN scan, and it requires a privileged (root or sudo) user to run. SYN scan does not need to complete the TCP 3-way handshake; instead, it tears down the connection after receiving a response from the server. Because we didn't establish a TCP connection, the scan is less likely to be logged. We can select this scan type by using the -sS option. The figure below shows how the TCP SYN scan works without completing the TCP 3-way handshake.

None

The following screenshot from Wireshark shows a TCP SYN scan. The behaviour when TCP ports are closed is similar to that of a TCP connect scan.

None
None

To better see the difference between the two scans, consider the following screenshot. In the upper half of the following figure, we can see TCP connect scan -sT traffic. Any open TCP port will require Nmap to complete the TCP 3-way handshake before closing the connection. In the lower half of the following figure, we see how a SYN scan -sS does not need to complete the TCP 3-way handshake; instead, Nmap sends an RST packet once a SYN/ACK packet is received.

None
TCP Connect Scan
None
TCP SYN Scan

TCP SYN scan is the default scan mode when running Nmap as a privileged user (root or sudo), and it is a very reliable choice. It has successfully discovered the open ports you found earlier with the TCP connect scan, yet no TCP connection was fully established with the target.

Terminal

root@ip-10-201-98-13:~# nmap -sS 10.10.105.229
Starting Nmap 7.80 ( https://nmap.org ) at 2026-02-10 12:08 GMT
mass_dns: warning: Unable to open /etc/resolv.conf. Try using --system-dns or specify valid servers with --dns-servers
mass_dns: warning: Unable to determine any DNS servers. Reverse DNS is disabled. Try using --system-dns or specify valid servers with --dns-servers
Nmap scan report for 10.10.105.229
Host is up (0.070s latency).
Not shown: 996 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
53/tcp open domain
80/tcp open http

Nmap done: 1 IP address (1 host up) scanned in 1.36 seconds

Q: After launching a TCP SYN scan, how many SYN-ACK packets are successfully received in AttackBox?

A: 4

Q: How many ports are open on the target machine?

A: 4

UDP Scan

UDP is a connectionless protocol; hence, it does not require a handshake for connection establishment. We cannot guarantee that a service listening on a UDP port would respond to our packets. However, if a UDP packet is sent to a closed port, an ICMP port unreachable error (type 3, code 3) is returned. You can select UDP scan using the -sU option; moreover, you can combine it with another TCP scan.

The following figure shows that if we send a UDP packet to an open UDP port, we cannot expect a reply. Therefore, sending a UDP packet to an open port won't tell us anything.

None

However, as shown in the figure below, we expect to receive an ICMP type 3, code 3, destination unreachable, port unreachable message. In other words, the UDP ports that don't generate any response are the ones that Nmap will state as open.

None

In the Wireshark capture below, we can see that every closed port generates an ICMP destination unreachable (port unreachable) message.

None

From the AB, use the following command to perform a UDP scan of the top 10 ports on the target machine:

Terminal

root@ip-10-201-98-13:~# nmap -sU --top-ports 10 10.112.154.61
Starting Nmap 7.80 ( https://nmap.org ) at 2026-02-10 12:29 GMT
mass_dns: warning: Unable to open /etc/resolv.conf. Try using --system-dns or specify valid servers with --dns-servers
mass_dns: warning: Unable to determine any DNS servers. Reverse DNS is disabled. Try using --system-dns or specify valid servers with --dns-servers
Nmap scan report for 10.112.154.61
Host is up (0.070s latency).

PORT STATE SERVICE
53/udp open domain
67/udp closed dhcps
123/udp closed ntp
135/udp closed msrpc
137/udp closed netbios-ns
138/udp closed netbios-dgm
161/udp closed snmp
445/udp closed microsoft-ds
631/udp closed ipp
1434/udp closed ms-sql-m

Nmap done: 1 IP address (1 host up) scanned in 1.45 seconds

Launching a UDP scan against this server proved valuable, and indeed, we learned that port 53 is open, while it also shared the status of multiple closed ports.

Q: What is the state of port number 161 over UDP in the target machine?

A: closed

Q: What is the service name according to Nmap on port 161?

A: snmp

Fine-Tuning Scope and Performance

You can specify the ports you want to scan instead of the default 1000 ports. Specifying the ports is intuitive by now. Let's see some examples:

None
  • port list: -p22,80,443 will scan ports 22, 80 and 443.
  • port range: -p1-1023 will scan all ports between 1 and 1023 inclusive, while -p20-25 will scan ports between 20 and 25 inclusive.

You can request the scan of all ports by using -p-, which will scan all 65535 ports. If you want to scan the most common 100 ports, add -F. Using --top-ports 10 will check the ten most common ports.

You can control the scan timing using -T<0-5>. -T0 is the slowest (paranoid), while -T5 is the fastest. According to the Nmap manual page, there are six templates:

  • paranoid (0)
  • sneaky (1)
  • polite (2)
  • normal (3)
  • aggressive (4)
  • insane (5)

To avoid IDS alerts, you might consider -T0 or -T1. For instance, -T0 scans one port at a time and waits 5 minutes between sending each probe, so you can guess how long scanning one target would take to finish. If you don't specify any timing, Nmap uses normal -T3. Note that -T5 is the most aggressive in terms of speed; however, this can affect the accuracy of the scan results due to the increased likelihood of packet loss. Note that -T4 is often used during CTFs and when learning to scan on practice targets, whereas -T1 is often used during real engagements where stealth is more important.

Alternatively, you can choose to control the packet rate using --min-rate <number> and --max-rate <number>. For example, --max-rate 10 or --max-rate=10 ensures that your scanner is not sending more than ten packets per second.

Moreover, you can control probing parallelisation using --min-parallelism <numprobes> and --max-parallelism <numprobes>. Nmap probes targets to discover which hosts are live and which ports are open; the probing parallelisation parameter specifies the number of such probes that can run in parallel. For instance, --min-parallelism=512 pushes Nmap to maintain at least 512 probes in parallel; these 512 probes are related to host discovery and open ports.

Q: What is the option to scan all the TCP ports between 5000 and 5500?

A: -p5000–5500

Q: How can you ensure that Nmap will run at least 64 probes in parallel?

A: — min-parallelism=64

Q: What option would you add to make Nmap very slow and paranoid?

A: -T0

Summary

This room covered three types of scans.

None

These scan types should get you started discovering running TCP and UDP services on a target host.

None

Conclusion

Here's the link to the room on TryHackMe: https://tryhackme.com/room/nmap02. Check it out, and solve the lab, if you haven't.