Skip to main content

ACK Scan..

An ACK scan operates by sending a TCP ACK frame to a remote port. If there are no responses or an ICMP destination unreachable message is returned, then the port is considered to be "filtered"
Scans of ports are done for a variety of reasons, but they usually are used to discover whether a host or hosts are offering a particular service. If a host is found to be offering a service that might be exploitable, the hacker might try to break in using some vulnerability.Often, scans are blatant; the hacker makes no attempt to hide his reconnaissance of your network, except that the computer from which the scans originate might be compromised. The hacker assumes
that either no one is monitoring the scanning activity or that by using the compromised host, no one can identify the hacker with the scan. Most likely there will be no attribution because no one can associate the hacker with the scan.

This can be done by issuing folowing command
#nmap -sA <host_address>
Following is the output of sample ACK scan output...

Starting Nmap 5.00 ( http://nmap.org ) at 2011-09-03 00:09 IST
NSE: Loaded 0 scripts for scanning.
Initiating ACK Scan at 00:09
Scanning 10.10.11.1 [1000 ports]
ACK Scan Timing: About 15.25% done; ETC: 00:13 (0:02:52 remaining)
ACK Scan Timing: About 30.15% done; ETC: 00:13 (0:02:21 remaining)
ACK Scan Timing: About 45.15% done; ETC: 00:13 (0:01:51 remaining)
ACK Scan Timing: About 60.15% done; ETC: 00:13 (0:01:20 remaining)
ACK Scan Timing: About 75.15% done; ETC: 00:13 (0:00:50 remaining)
Completed ACK Scan at 00:13, 201.20s elapsed (1000 total ports)
Host 10.10.11.1 is up.
All 1000 scanned ports on 10.10.11.1 are filtered
Read data files from: /usr/share/nmap
Nmap done: 1 IP address (1 host up) scanned in 201.36 seconds
           Raw packets sent: 2000 (80.000KB) | Rcvd: 1257 (90.588KB)




There is a difference between the  "filtered" ports and the "closed" ports.
closed ports do not allow for further communication and timeout occurs.
whereas "filetered" ports just straight away reject the incoming connection, i.e they are behind a firewall. Filtered means that there is a firewall somewhere which is 'intercepting' and dropping communications for a port. Actually, we don't so much filter a PORT as we filter datagrams based on whatever the rules are... and it's entirely possible that the 'rules' can be "drop all packets for this port" or "drop all packets EXCEPT those for this port"

IN the above exaple 1000 ports of the host 10.10.11.1  are  all behind a firewall.

Advantages:
Since the ACK scan doesn't open any application sessions, the conversation between nmap and the remote device is relatively simple. This scan of a single port is unobtrusive and almost invisible when combined with the other network traffic.
The ACK scan's simplicity is also its largest disadvantage. Because it never tries to connect to a remote device, it can never definitively identify an open port. 

When to use the ACK Scan
Although the ACK scan doesn't identify open ports, it does a masterful job of identifying ports that are filtered through a firewall. This list of filtered and unfiltered port numbers is useful as reconnaissance for a more detailed scan that focuses on specific port numbers.

Comments

  1. Short pay refers to a partial payout made by a slot machine, which is lower than the quantity due to the of} player. This happens if the coin hopper has been 솔카지노 depleted as a result of|because of|on account of} making earlier payouts to players. The remaining quantity due to the of} player is either paid as a hand pay or an attendant will come and refill the machine. Denominations can range from 1 cent ("penny slots") all finest way|the means in which} a lot as} $100.00 or more per credit.

    ReplyDelete

Post a Comment

Popular posts from this blog

Database Sharding

Collating some of the resources which talks about Database Sharding. https://en.wikipedia.org/wiki/Shard_(database_architecture) [Feb 2019]  http://highscalability.com/blog/2019/2/19/intro-to-redis-cluster-sharding-advantages-limitations-deplo.html Redis Cluster is the Native Sharding implementation available within Redis that allows your to automatically distribute your data across multiple nodes without having to rely on external tools and utilities. Its covers Sharding with Redis Cluster  where Redis Clusters is divided in 16384 slots and these slots are assigned to multiple Redis Nodes. The  Redis Cluster Specification  is the definitive guide to understanding the internals of the technology, while the  Redis Cluster Tutorial  provides deployment and administration guidelines. [ Jan 2019  ]  https://scalegrid.io/blog/scalegrid-hosting-adds-support-for-highly-available-redis-clusters-with-automated-sharding/ ScaleGrid : Fully Manage...

Penetration Testing Basics

Penetration testing, often called “pentesting”,“pen testing”, or “security testing”, is the practice of attacking your own or your clients’ IT systems in the same way a hacker would to identify security holes. Of course, you do this without actually harming the network. The person carrying out a penetration test is called a penetration tester or pentester. The difference between Penetration Testing and Hacking is that you have the system owner's permission to do testing and to identfiy security holes. If you want to do penetration testing u should better ask for his/her permission. Basic Security Concepts Vulnerability: It is a security hole in a piece of software, hardware of Operating system that provides a way to attack the system.A vulnerabilty is as simple as weak passwords and as complex as buffer overflows as well as SQL injection. Security Research: Vulnerabilities are typically searched by security researchers who finds the flaws in the system. Security Research can ...