Theory Test 3 Flashcards
Port Scanning
A method of finding out which services/ports a host computer offers.
Port States
Open, Closed, Filtered
Open Port
Send a SYN, receive a SYN/ACK
Closed Port
Send a SYN, receive a RST
Filtered Port
(Presumably behind a firewall) Packet dropped, no response
Types of Port Scans
TCP SYN Scan, TCP FIN Scan, Connect Scan, NULL Scan
TCP SYN Scan
Half-open scanning. SYN is sent, if SYN/ACK recieved, port is listening, send a RST immediately to terminate connection. Few servers log this because no full connection is made. (nmap -s in root for SYN scan)
TCP FIN Scan
Attempt to close a connection that isn’t open. Closed ports reply with RST. Open ports ignore, so no response is a listening port.
Connect Scan
Opens a connection to every interesting port. Success if port is listening. Not stealthy but fastest scanning method.
NULL Scan
No flags, target doesn’t know how to handle, packet dropped, no response, port listening. Closed port sends a RST.
Common Scanning Types
Terminal/Command line ping sweeps, port scanner software
Terminal/Command Line Ping Sweeps
Look for echo replies. Recon looking for shares or accessibilities.
Port Scanning Software
Look for normal TCP connection response. Further recon looking for OS/Software vulnerabilities.
Windows File Sharing Ports
139 (NetBIOS), 445 (SMB)
Port scanning programs report what?
Port state, best guess OS, services likely running, ping reports, more.