Announcement
Collapse
No announcement yet.
Search Result
Collapse
8 results in 0.0118 seconds.
Keywords
Members
Tags
-
Port Scanning - UDP Scan
Port scanning a target host for open UDP ports is very different from scanning for TCP ports in that TCP is connection oriented and UDP is connectionless;... -
Port Scanning - ACK Scan
An interesting use of setting flags during a port scan is the use of the ACK scan which is used to test whether any filtering is being done on the target... -
Port Scanning - NULL Scan
In this type of scan, the attacker sends frames to the target host with no flags set. The response from this kind of a scan depends on whether the target... -
Port Scanning - FIN Scan
In this type of scan, the attacker sends frames to the target with the FIN flag set. The result is somewhat similar to what happens in an Xmas tree scan.... -
Port Scanning - Xmas Tree Scan
The Xmas Tree scan is a type of scan that (according to ISBN 978-1-118-64767-7) sends a packet with all flag bits set except for the PSH flag. Having... -
Port Scanning - Stealth Scan or Half-Open Scan
This type of scan is similar to the full open scan, with a few minor but important differnces. In this case, the attacker does not send the final ACK... -
Port Scanning - Full Open Scan
One type of scan is known as a Full Open Scan, which is just a fancy way of saying that the two systems involved in the scan both initiate and complete... -
Checking for Open Ports - Port Scanning
When live hosts are identified, the next step is to identify which TCP and UDP services are available for each target host.
The number of ports...