Port Scanning Assumptions
All forms of port scanning rely on the assumption that the targeted host is compliant with RFC 793 - Transmission Control Protocol. Although it is the case most of the time, there is still a chance a host might send back strange packets or even generate false positives when the TCP/IP stack of the host is non-RFC-compliant or has been altered. This is especially true for less common scan techniques that are OS-dependent (FIN scanning, for example). The TCP/IP stack fingerprinting method also relies on these kind of different network responses from a specific stimulus to guess the type of the operating system the host is running.
Read more about this topic: Port Scanner
Famous quotes containing the words port and/or assumptions:
“Through the port comes the moon-shine astray!
It tips the guards cutlass and silvers this nook;
But twill die in the dawning of Billys last day.
A jewel-block theyll make of me to-morrow,
Pendant pearl from the yard-arm-end
Like the ear-drop I gave to Bristol Molly
O, tis me, not the sentence theyll suspend.”
—Herman Melville (18191891)
“Assumptions of male superiority are as widespread and deep rooted and every bit as crippling to the woman as the assumptions of white supremacy are to the Negro.... this is no more a mans world than it is a white world.”
—Student Non-Violent Coordinating Committee, African American civil rights organization. SNCC Position Paper (Women in the Movement)