TCP SYN-ACK
The SYN-ACK probe targets hosts that may have existing TCP connections by sending forged SYN-ACK packets. Any RST or ACK response indicates activity on the probed port.
rmap scan --path targets.txt tcp-syn-ack --port 80 \
--output-file synack.csv --columns target,port,tcp_flags,aliasConfiguration
--port <u16>– destination port to probe (default80).
Tags emitted
port– source port from the response.tcp_flags– hex representation of the responder’s TCP flags.alias/alias_prefix– dealiaser verdict.
SYN-ACK probing is noisier than regular SYN scans and should be used sparingly due to potential IDS triggers.