Port Scanner - Port Scanning Assumptions

Port Scanning Assumptions

All forms of port scanning rely on the assumption that the targeted host is compliant with RFC 793 - Transmission Control Protocol. Although it is the case most of the time, there is still a chance a host might send back strange packets or even generate false positives when the TCP/IP stack of the host is non-RFC-compliant or has been altered. This is especially true for less common scan techniques that are OS-dependent (FIN scanning, for example). The TCP/IP stack fingerprinting method also relies on these kind of different network responses from a specific stimulus to guess the type of the operating system the host is running.

Read more about this topic:  Port Scanner

Famous quotes containing the words port and/or assumptions:

    In the midst of this chopping sea of civilized life, such are the clouds and storms and quicksands and thousand-and-one items to be allowed for, that a man has to live, if he would not founder and go to the bottom and not make his port at all, by dead reckoning, and he must be a great calculator indeed who succeeds.
    Henry David Thoreau (1817–1862)

    What a man believes may be ascertained, not from his creed, but from the assumptions on which he habitually acts.
    George Bernard Shaw (1856–1950)