Port scanner: Difference between revisions

Content deleted Content added
m Reverting possible vandalism by JellyJammin66666 to version by Alievinfo. Report False Positive? Thanks, ClueBot NG. (4260746) (Bot)
Link not allowed
Line 23:
 
==Assumptions==
All forms of port scanning rely on the assumption that the targeted host is compliant with [[Request for Comments|RFC]] [http://www.faqs.org/rfcs/rfc793.html 793 - Transmission Control Protocol]. Although this is the case most of the time, there is still a chance a host might send back strange packets or even generate [[False positive#Type I error|false positives]] when the TCP/IP stack of the host is non-RFC-compliant or has been altered. This is especially true for less common scan techniques that are [[Operating system|OS]]-dependent (FIN scanning, for example).<ref name=ERIK77>{{cite book |last1= Erikson |first1= Jon |title=HACKING the art of exploitation |edition=2nd |year= 1977 |publisher= NoStarch Press|location= San Francisco|isbn=1-59327-144-1 |page= 264 }}
</ref> The [[TCP/IP stack fingerprinting]] method also relies on these types of different network responses from a specific stimulus to guess the type of the operating system the host is running.