![Port Scanning > Penetration Testing and Network Defense: Performing Host Reconnaissance | Cisco Press Port Scanning > Penetration Testing and Network Defense: Performing Host Reconnaissance | Cisco Press](https://www.ciscopress.com/content/images/chap5_1587052083/elementLinks/05fig16.gif)
Port Scanning > Penetration Testing and Network Defense: Performing Host Reconnaissance | Cisco Press
![TCP SYN scan: static versus dynamic results of what the sensors saw in... | Download Scientific Diagram TCP SYN scan: static versus dynamic results of what the sensors saw in... | Download Scientific Diagram](https://www.researchgate.net/profile/Dorene-Ryder-2/publication/3901981/figure/fig4/AS:279871394729988@1443737948679/TCP-SYN-scan-static-versus-dynamic-results-of-what-the-sensors-saw-in-the-IP-port-range.png)
TCP SYN scan: static versus dynamic results of what the sensors saw in... | Download Scientific Diagram
![NMAP – How to run an NMAP -sS SYN Stealth Scan on Windows 7 – The Visual Guide | University of South Wales: Cyber University of the year: Three years running: 2019, 2020, 2021 NMAP – How to run an NMAP -sS SYN Stealth Scan on Windows 7 – The Visual Guide | University of South Wales: Cyber University of the year: Three years running: 2019, 2020, 2021](https://uwnthesis.files.wordpress.com/2014/07/tcp-syn-scan.jpg?w=640)
NMAP – How to run an NMAP -sS SYN Stealth Scan on Windows 7 – The Visual Guide | University of South Wales: Cyber University of the year: Three years running: 2019, 2020, 2021
![Optimizing Your Nmap Scan: Nmap Scanning Methods - Professor Messer IT Certification Training Courses Optimizing Your Nmap Scan: Nmap Scanning Methods - Professor Messer IT Certification Training Courses](https://www.professormesser.com/images/connect_scan.gif)