Port Scanning Assumptions
All forms of port scanning rely on the assumption that the targeted host is compliant with RFC 793 - Transmission Control Protocol. Although it is the case most of the time, there is still a chance a host might send back strange packets or even generate false positives when the TCP/IP stack of the host is non-RFC-compliant or has been altered. This is especially true for less common scan techniques that are OS-dependent (FIN scanning, for example). The TCP/IP stack fingerprinting method also relies on these kind of different network responses from a specific stimulus to guess the type of the operating system the host is running.
Read more about this topic: Port Scanner
Famous quotes containing the words port and/or assumptions:
“Through the port comes the moon-shine astray!
It tips the guards cutlass and silvers this nook;
But twill die in the dawning of Billys last day.
A jewel-block theyll make of me to-morrow,
Pendant pearl from the yard-arm-end
Like the ear-drop I gave to Bristol Molly
O, tis me, not the sentence theyll suspend.”
—Herman Melville (18191891)
“What a man believes may be ascertained, not from his creed, but from the assumptions on which he habitually acts.”
—George Bernard Shaw (18561950)