Port scanner: Difference between revisions

Content deleted Content added
Alievinfo (talk | contribs)
SdkbBot (talk | contribs)
m Removed erroneous space and general fixes (task 1)
Line 4:
A '''port scan''' or '''portscan''' is a process that sends client requests to a range of server port addresses on a host, with the goal of finding an active port; this is not a nefarious process in and of itself.<ref>RFC 2828 ''Internet Security Glossary''</ref> The majority of uses of a port scan are not attacks, but rather simple probes to determine services available on a remote machine.
 
To '''portsweep''' is to scan multiple hosts for a specific listening port. The latter is typically used to search for a specific service, for example, an [[SQL]]-based [[computer worm]] may portsweep looking for hosts listening on [[Transmission Control Protocol|TCP]] port 1433.<ref>{{cite web |url=http://support.microsoft.com/kb/313418 |title=PRB: Unsecured SQL Server with Blank (NULL) SA Password Leaves Vulnerability to a Worm |website=support.microsoft.com |url-status=dead |archive-url=https://web.archive.org/web/20060303130907/http://support.microsoft.com/kb/313418/ |archive-date=2006-03-03}} </ref>
 
==TCP/IP basics==
Line 40:
</ref>
 
An alternative approach is to send application-specific UDP packets, hoping to generate an application layer response. For example, sending a DNS query to port 53 will result in a response, if a DNS server is present. This method is much more reliable at identifying open ports. However, it is limited to scanning ports for which an application specific probe packet is available. Some tools (e.g., [[Nmap]], [[Unionscan]] <ref name=portscanner>{{cite book|title=Port Scan Commands|url=https://portscanner.online/portscan-commands|archive-url=https://web.archive.org/web/20230210162706/https://portscanner.online/portscan-commands|archive-date=2023-02-10|access-date=2023-02-10|url-status=live}}</ref>) generally have probes for less than 20 UDP services, while some commercial tools have as many as 70. In some cases, a service may be listening on the port, but configured not to respond to the particular probe packet.
 
===ACK scanning===