Port Scanner - Port Scanning Assumptions

Port Scanning Assumptions

All forms of port scanning rely on the assumption that the targeted host is compliant with RFC 793 - Transmission Control Protocol. Although it is the case most of the time, there is still a chance a host might send back strange packets or even generate false positives when the TCP/IP stack of the host is non-RFC-compliant or has been altered. This is especially true for less common scan techniques that are OS-dependent (FIN scanning, for example). The TCP/IP stack fingerprinting method also relies on these kind of different network responses from a specific stimulus to guess the type of the operating system the host is running.

Read more about this topic:  Port Scanner

Famous quotes containing the words port and/or assumptions:

    Through the port comes the moon-shine astray!
    It tips the guard’s cutlass and silvers this nook;
    But ‘twill die in the dawning of Billy’s last day.
    A jewel-block they’ll make of me to-morrow,
    Pendant pearl from the yard-arm-end
    Like the ear-drop I gave to Bristol Molly—
    O, ‘tis me, not the sentence they’ll suspend.
    Herman Melville (1819–1891)

    What a man believes may be ascertained, not from his creed, but from the assumptions on which he habitually acts.
    George Bernard Shaw (1856–1950)