This document summarizes different port scanning methods and tools used to perform them. It describes non-stealth scanning (TCP connect), inverse mapping scanning, slow scanning, SYN scanning, FIN scanning, Xmas tree scanning, null scanning, UDP scanning, and idle scanning. For each method, it provides details on how the method works, advantages/disadvantages, and example tools that can be used to implement the scanning method. The document is intended to inform readers about various port scanning techniques and their characteristics.