Port Scanning: Port scanning is carried out to determine a list of open ports on the remote host that have certain services or daemons running. In port scanning, the attacker connects to various TCP and UDP ports and tries to determine which ports are in listening mode.
1. TCP Ports Scanning: Almost all port scans are based on the client sending a packet containing a particular flag to the target port of the remote system to determine whether the port is open. Following table lists the type of flags a TCP packet header can contain.
A typical TCP/IP three way handshake can be described as follows:
- The client sends a SYN packet to the server.
- The server replies with a SYN packet and acknowledges the client's SYN packet by sending an ACK packet.
- The client acknowledges the SYN sent by the server.
Different techniques of TCP port scanning are:
- TCP connect port scanning
- TCP SYN scanning (half open scanning)
- SYN/ACK scanning
- TCP FIN scanning
- TCP NULL scanning
- TCP Xmas tree scanning
2. UDP Ports Scanning: In UDP port scanning, aUDP packet is sent to each port on the target host one by one.
If the remote port is closed, then the server replies with a Port Unreachable ICMP error message. If the port is open then no such error message is generated.
3. FTP Bounce Port Scanning: The FTP bounce port scanning technique was discovered by Hobbit. He revealed a very interesting loophole in the FTP protocol that allowed users connected to the FTP service of a particular system to connect to any port of another system. This loophole allows anonymous port scanning.
Recommended Tools
Nmap - Download here
Superscan - Download here
Do you have questions, comments, or suggestions? Feel free to post a comment!
Source
0 comments:
Post a Comment