Port Scanning Assumptions
All forms of port scanning rely on the assumption that the targeted host is compliant with RFC 793 - Transmission Control Protocol. Although it is the case most of the time, there is still a chance a host might send back strange packets or even generate false positives when the TCP/IP stack of the host is non-RFC-compliant or has been altered. This is especially true for less common scan techniques that are OS-dependent (FIN scanning, for example). The TCP/IP stack fingerprinting method also relies on these kind of different network responses from a specific stimulus to guess the type of the operating system the host is running.
Read more about this topic: Port Scanner
Famous quotes containing the words port and/or assumptions:
“When we think back to our forefathers, with their sedentary lives of forest-chopping, railroad-building, fortune-founding, their fox-hunting and Indian taming, their prancing about in the mazurka and the polka, with their coattails flying and their bustles bouncing, to say nothing of their all-day sessions with the port and straight bourbon,... we must realize that we are a nation, not of neurasthenics, but of sissies and slow-motion sports.”
—Robert Benchley (18891945)
“What a man believes may be ascertained, not from his creed, but from the assumptions on which he habitually acts.”
—George Bernard Shaw (18561950)