connect kontra syn scan (newbie fråga)|Nätverk / Internet|Forum|Nordichardware

Search
Forum Scope


Match



Forum Options



Minimum search word length is 3 characters - maximum search word length is 84 characters
Lost password?
The forums are currently locked and only available for read only access
sp_Feed sp_TopicIcon
connect kontra syn scan (newbie fråga)
Lordberg2
Hi, nice to meet you!
Medlem
Forum Posts: 1
Member Since:
October 6, 2003
sp_UserOfflineSmall Offline
1
October 6, 2003 - 6:32 pm
sp_Permalink sp_Print

Jag har scannat ett antal datorer och får alltid samma resultat från en port connect och syn scan, men jag har hört att man skall kunna få olika resultat med de olika metoderna. Är detta sant? varför kan man få det eller varför kan man inte få det?

69link
Kommer du hit ofta?
Medlem
Forum Posts: 1398
Member Since:
July 2, 2001
sp_UserOfflineSmall Offline
430017
October 6, 2003 - 8:35 pm
sp_Permalink sp_Print

Så här står det i man för nmap:

SCAN TYPES

-sS TCP SYN scan: This technique is often referred to as "half-open" scanning, because you
don't open a full TCP connection. You send a SYN packet, as if you are going to open a
real connection and you wait for a response. A SYN|ACK indicates the port is listening.
A RST is indicative of a non-listener. If a SYN|ACK is received, a RST is immediately
sent to tear down the connection (actually our OS kernel does this for us). The primary
advantage to this scanning technique is that fewer sites will log it. Unfortunately
you need root privileges to build these custom SYN packets. This is the default scan
type for privileged users.

-sT TCP connect() scan: This is the most basic form of TCP scanning. The connect() system
call provided by your operating system is used to open a connection to every interest-
ing port on the machine. If the port is listening, connect() will succeed, otherwise
the port isn't reachable. One strong advantage to this technique is that you don't need
any special privileges. Any user on most UNIX boxes is free to use this call.

This sort of scan is easily detectable as target host logs will show a bunch of connec-
tion and error messages for the services which accept() the connection just to have it
immediately shutdown. This is the default scan type for unprivileged users.

Forum Timezone: Europe/Stockholm
Most Users Ever Online: 1030
Currently Online:
Guest(s) 37
Currently Browsing this Page:
2 Guest(s)
Top Posters:
Andreas Galistel: 16287
Jonas Klar: 15897
ilg@dd: 10810
Nyhet: 10607
Mind: 10550
Ctrl: 10355
Gueno: 9881
Guest: 9344
Snorch: 8881
Callister: 8468
Newest Members:
PetrbonFU PetrbonFU
Karine Bembry
Dolores Mcdaniels
Anibal McLeish
Francisca Alt
Alfie Everhart
Lester Huitt
Orlando Jorgensen
Mikki Lundgren
Dakota Kozlowski
Forum Stats:
Groups: 11
Forums: 59
Topics: 146630
Posts: 1300967

 

Member Stats:
Guest Posters: 2
Members: 79425
Moderators: 0
Admins: 11
Administrators: nordicadmin, Henrik Berntsson, Anton Karmehed, Carl Holmberg, Joel Oscarsson, Mikael Linnér, Mikael Schwartz, Andreas Paulsson, Nickebjrk, Mattias Pettersson, EmxL