TCP/IP port scanning
Using port scanning an attacker tries to identify,
which services are supported from a potential target host.
Whenever an active port
is located, an attacker may
attempt to further determine the version number of any active server/service.
Although port-scanning software such as nmap may be used,
much of the information about active ports can be
determined by a simple tool like telnet as well.
What information does an attacker learn from port scanning?
- if an attacker learns that a port is open,
they can actually connect to the detected port.,
- if an attacker learns that a port is closed,
they learn that no service is listening to that port,
- additionally, some scanning software reports ports as
filtered,
indicating that a connected attempt was terminated with a RESET
or timed out.
For example, the naive TCP Connect Scan
completes the TCP three-way-handshake.
A SYN packet is sent to the system and if a SYN/ACK packet
is received, it is assumed that the port on the system is active.
If a RST/ACK packet is received,
it is assumed that the port on the system is not active.
Attackers may further attempt to hide their scans by:
- scanning through ports very slowly,
and certainly not in numercial order - unless on a very quiet system,
these will not be detected.
- perform hundreds of scans simultaneously from hundreds of
random/spoofed IP addresses.
The target host will know they are being scanned, by not from where.
CITS3002 Computer Networks, Lecture 11, Security of TCP/IP, p5, 15th May 2024.
|