![]() The simplest port scanners use the operating system's network functions and are generally the next option to go to when SYN is not a feasible option (described next). The TCP/IP stack fingerprinting method also relies on these types of different network responses from a specific stimulus to guess the type of the operating system the host is running. This is especially true for less common scan techniques that are OS-dependent (FIN scanning, for example). Although this is the case most of the time, there is still a chance a host might send back strange packets or even generate false positives when the TCP/IP stack of the host is non-RFC-compliant or has been altered.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |