Nmap: NULL, FIN and Xmas.
NULL Scan:
- A NULL scan is a stealthy scanning technique where Nmap sends TCP packets with no TCP flag set (hence the name "NULL"). Normally, TCP packets have flags like SYN, ACK, PSH, RST, and FIN set in various combinations.
- In a NULL scan, if the target host's TCP stack is RFC-compliant, it should respond with a TCP RST (reset) packet for a closed port and ignore the packet for an open port.
- The NULL scan is useful for identifying open ports when traditional scanning methods may be detected or blocked by a firewall or intrusion detection system (IDS).
FIN Scan:
- A FIN scan is another stealthy scanning technique that involves sending TCP packets with only the FIN (Finish) flag set.
- Similar to the NULL scan, if a port is closed, the target system should respond with a TCP RST packet. If the port is open, it should ignore the packet.
- The FIN scan can be used to probe for open ports without making a lot of noise, making it useful for evading network monitoring or firewall rules.
Xmas Scan:
- An Xmas scan is a variant of the FIN scan where Nmap sends TCP packets with the FIN, URG (Urgent), and PSH (Push) flags set, resembling the blinking lights of a Christmas tree, hence the name "Xmas."
- Like the NULL and FIN scans, the Xmas scan relies on the target system's behavior. Closed ports should respond with a TCP RST packet, while open ports should generally ignore the packet.
- The Xmas scan can help identify open ports discreetly, similar to the NULL and FIN scans.
------------------------------------------------------------------------------------------------------------------------
It's important to note that the effectiveness of these scans can vary depending on the target system's TCP stack implementation and the presence of firewalls or IDSs.
Some systems may not respond as expected to these unusual flag combinations, potentially leading to false results.
Additionally, because these scans are designed to be stealthy, they may not provide as much information as other Nmap scan types, such as SYN scans or TCP Connect scans, which are more commonly used for comprehensive network reconnaissance.
------------------------------------------------------------------------------------------------------------------------
Question 1: Which of the three shown scan types uses the URG flag?
Answer: xmas
Question 2: Why are NULL, FIN and Xmas scans generally used?
Answer: Firewall Evasion
Answer: xmas
Question 2: Why are NULL, FIN and Xmas scans generally used?
Answer: Firewall Evasion
Question 3: Which common OS may respond to a NULL, FIN or Xmas scan with a RST for every port?
Answer: Microsoft Windows
Answer: Microsoft Windows
------------------------------------------------------------------------------------------------------------------------
Thanks for reading.
Roger - Ozz961.
Comments