Port scanner

A port scanner is an application designed to probe a server or host for open ports. Such an application may be used by administrators to verify security policies of their networks and by attackers to identify network services running on a host and exploit vulnerabilities.

A port scan or portscan is a process that sends client requests to a range of server port addresses on a host, with the goal of finding an active port; this is not a nefarious process in and of itself.[1] The majority of uses of a port scan are not attacks, but rather simple probes to determine services available on a remote machine.

To portsweep is to scan multiple hosts for a specific listening port. The latter is typically used to search for a specific service, for example, an SQL-based computer worm may portsweep looking for hosts listening on TCP port 1433.[2]

TCP/IP basics

The design and operation of the Internet is based on the Internet Protocol Suite, commonly also called TCP/IP. In this system, network services are referenced using two components: a host address and a port number. There are 65535 distinct and usable port numbers, numbered 1 … 65535. (Port zero is not a usable port number.) Most services use one, or at most a limited range of, port numbers.

Some port scanners scan only the most common port numbers, or ports most commonly associated with vulnerable services, on a given host.

The result of a scan on a port is usually generalized into one of three categories:

  1. Open or Accepted: The host sent a reply indicating that a service is listening on the port.
  2. Closed or Denied or Not Listening: The host sent a reply indicating that connections will be denied to the port.
  3. Filtered, Dropped or Blocked: There was no reply from the host.

Open ports present two vulnerabilities of which administrators must be wary:

  1. Security and stability concerns associated with the program responsible for delivering the service - Open ports.
  2. Security and stability concerns associated with the operating system that is running on the host - Open or Closed ports.

Filtered ports do not tend to present vulnerabilities.

Assumptions

All forms of port scanning rely on the assumption that the targeted host is compliant with RFC. Although this is the case most of the time, there is still a chance a host might send back strange packets or even generate false positives when the TCP/IP stack of the host is non-RFC-compliant or has been altered. This is especially true for less common scan techniques that are OS-dependent (FIN scanning, for example).[3] The TCP/IP stack fingerprinting method also relies on these types of different network responses from a specific stimulus to guess the type of the operating system the host is running.

Types of scans

TCP scanning

The simplest port scanners use the operating system's network functions and are generally the next option to go to when SYN is not a feasible option (described next). Nmap calls this mode connect scan, named after the Unix connect() system call. If a port is open, the operating system completes the TCP three-way handshake, and the port scanner immediately closes the connection to avoid performing a Denial-of-service attack.[3] Otherwise an error code is returned. This scan mode has the advantage that the user does not require special privileges. However, using the OS network functions prevents low-level control, so this scan type is less common. This method is "noisy", particularly if it is a "portsweep": the services can log the sender IP address and Intrusion detection systems can raise an alarm.

SYN scanning

SYN scan is another form of TCP scanning. Rather than using the operating system's network functions, the port scanner generates raw IP packets itself, and monitors for responses. This scan type is also known as "half-open scanning", because it never actually opens a full TCP connection. The port scanner generates a SYN packet. If the target port is open, it will respond with a SYN-ACK packet. The scanner host responds with an RST packet, closing the connection before the handshake is completed.[3] If the port is closed but unfiltered, the target will instantly respond with an RST packet.

The use of raw networking has several advantages, giving the scanner full control of the packets sent and the timeout for responses, and allowing detailed reporting of the responses. There is debate over which scan is less intrusive on the target host. SYN scan has the advantage that the individual services never actually receive a connection. However, the RST during the handshake can cause problems for some network stacks, in particular simple devices like printers. There are no conclusive arguments either way.

UDP scanning

UDP scanning is also possible, although there are technical challenges. UDP is a connectionless protocol so there is no equivalent to a TCP SYN packet. However, if a UDP packet is sent to a port that is not open, the system will respond with an ICMP port unreachable message. Most UDP port scanners use this scanning method, and use the absence of a response to infer that a port is open. However, if a port is blocked by a firewall, this method will falsely report that the port is open. If the port unreachable message is blocked, all ports will appear open. This method is also affected by ICMP rate limiting.[4]

An alternative approach is to send application-specific UDP packets, hoping to generate an application layer response. For example, sending a DNS query to port 53 will result in a response, if a DNS server is present. This method is much more reliable at identifying open ports. However, it is limited to scanning ports for which an application specific probe packet is available. Some tools (e.g., Nmap, Unionscan[5]) generally have probes for less than 20 UDP services, while some commercial tools have as many as 70. In some cases, a service may be listening on the port, but configured not to respond to the particular probe packet.

ACK scanning

ACK scanning is one of the more unusual scan types, as it does not exactly determine whether the port is open or closed, but whether the port is filtered or unfiltered. This is especially good when attempting to probe for the existence of a firewall and its rulesets. Simple packet filtering will allow established connections (packets with the ACK bit set), whereas a more sophisticated stateful firewall might not.[6]

Window scanning

Rarely used because of its outdated nature, window scanning is fairly untrustworthy in determining whether a port is opened or closed. It generates the same packet as an ACK scan, but checks whether the window field of the packet has been modified. When the packet reaches its destination, a design flaw attempts to create a window size for the packet if the port is open, flagging the window field of the packet with 1's before it returns to the sender. Using this scanning technique with systems that no longer support this implementation returns 0's for the window field, labeling open ports as closed.[7]

FIN scanning

Since SYN scans are not surreptitious enough, firewalls are, in general, scanning for and blocking packets in the form of SYN packets.[3] FIN packets can bypass firewalls without modification. Closed ports reply to a FIN packet with the appropriate RST packet, whereas open ports ignore the packet on hand. This is typical behavior due to the nature of TCP, and is in some ways an inescapable downfall.[8]

Other scan types

Some more unusual scan types exist. These have various limitations and are not widely used. Nmap supports most of these.[6]

  • X-mas and Null Scan - are similar to FIN scanning, but:[3]
    • X-mas sends packets with FIN, URG and PUSH flags turned on like a Christmas tree
    • Null sends a packet with no TCP flags set
  • Protocol scan - determines what IP level protocols (TCP, UDP, GRE, etc.) are enabled.
  • Proxy scan - a proxy (SOCKS or HTTP) is used to perform the scan. The target will see the proxy's IP address as the source. This can also be done using some FTP servers.
  • Idle scan - Another method of scanning without revealing one's IP address, taking advantage of the predictable IP ID flaw.
  • CatSCAN - Checks ports for erroneous packets.
  • ICMP scan - determines if a host responds to ICMP requests, such as echo (ping), netmask, etc.

Port filtering by ISPs

Many Internet service providers restrict their customers' ability to perform port scans to destinations outside of their home networks. This is usually covered in the terms of service or acceptable use policy to which the customer must agree.[9][10] Some ISPs implement packet filters or transparent proxies that prevent outgoing service requests to certain ports. For example, if an ISP provides a transparent HTTP proxy on port 80, port scans of any address will appear to have port 80 open, regardless of the target host's actual configuration.

Security

The information gathered by a port scan has many legitimate uses including network inventory and the verification of the security of a network. Port scanning can, however, also be used to compromise security. Many exploits rely upon port scans to find open ports and send specific data patterns in an attempt to trigger a condition known as a buffer overflow. Such behavior can compromise the security of a network and the computers therein, resulting in the loss or exposure of sensitive information and the ability to do work.[3]

The threat level caused by a port scan can vary greatly according to the method used to scan, the kind of port scanned, its number, the value of the targeted host and the administrator who monitors the host. But a port scan is often viewed as a first step for an attack, and is therefore taken seriously because it can disclose much sensitive information about the host.[11] Despite this, the probability of a port scan alone followed by a real attack is small. The probability of an attack is much higher when the port scan is associated with a vulnerability scan.[12]

Because of the inherently open and decentralized architecture of the Internet, lawmakers have struggled since its creation to define legal boundaries that permit effective prosecution of cybercriminals. Cases involving port scanning activities are an example of the difficulties encountered in judging violations. Although these cases are rare, most of the time the legal process involves proving that an intent to commit a break-in or unauthorized access existed, rather than just the performance of a port scan.

In June 2003, an Israeli, Avi Mizrahi, was accused by the Israeli authorities of the offense of attempting the unauthorized access of computer material. He had port scanned the Mossad website. He was acquitted of all charges on February 29, 2004. The judge ruled that these kinds of actions should not be discouraged when they are performed in a positive way.[13]

A 17-year-old Finn was accused of attempted computer break-in by a major Finnish bank. On April 9, 2003, he was convicted of the charge by the Supreme Court of Finland and ordered to pay US$12,000 for the expense of the forensic analysis made by the bank. In 1998, he had port scanned the bank network in an attempt to access the closed network, but failed to do so.[14]

In 2006, the UK Parliament had voted an amendment to the Computer Misuse Act 1990 such that a person is guilty of an offence who "makes, adapts, supplies or offers to supply any article knowing that it is designed or adapted for use in the course of or in connection with an offence under section 1 or 3 [of the CMA]".[15] Nevertheless, the area of effect of this amendment is blurred, and widely criticized by Security experts as such.[16]

Germany, with the Strafgesetzbuch § 202a,b,c also has a similar law, and the Council of the European Union has issued a press release stating they plan to pass a similar one too, albeit more precise.[17]

United States

Moulton v. VC3

In December 1999, Scott Moulton was arrested by the FBI and accused of attempted computer trespassing under Georgia's Computer Systems Protection Act and Computer Fraud and Abuse Act of America. At this time, his IT service company had an ongoing contract with Cherokee County of Georgia to maintain and upgrade the 911 center security. He performed several port scans on Cherokee County servers to check their security and eventually port scanned a web server monitored by another IT company, provoking a tiff which ended up in a tribunal. He was acquitted in 2000, with judge Thomas Thrash ruling in Moulton v. VC3 (N.D. Ga. 2000)[18] that there was no damage impairing the integrity and availability of the network.[19]

See also

References

  1. ^ Shirey, R. (August 2007). Internet Security Glossary. 2. IETF. p. 230. doi:10.17487/RFC4949. RFC 4949. Retrieved November 21, 2023.
  2. ^ "PRB: Unsecured SQL Server with Blank (NULL) SA Password Leaves Vulnerability to a Worm". support.microsoft.com. Archived from the original on 2006-03-03.
  3. ^ a b c d e f Erikson, Jon (2008). Hacking: The Art of Exploitation (2nd ed.). San Francisco: No Starch Press. p. 264. ISBN 978-1-59327-144-2.
  4. ^ Messer, James (2007). Secrets of Network Cartography: A Comprehensive Guide to Nmap (2nd ed.). Archived from the original on 2016-05-16. Retrieved 2011-12-05.
  5. ^ Port Scan Commands. Archived from the original on 2023-02-10. Retrieved 2023-02-10.
  6. ^ a b "Port Scanning Techniques". Nmap reference guide. 2001. Retrieved 2009-05-07.
  7. ^ Messer, James (2007). Secrets of Network Cartography: A Comprehensive Guide to Nmap (2nd ed.). Archived from the original on 2006-02-01. Retrieved 2011-12-05.
  8. ^ Maimon, Uriel (1996-11-08). "Port Scanning without the SYN flag". Phrack issue 49. Retrieved 2009-05-08.
  9. ^ "Comcast Acceptable Use Policy". Comcast. 2009-01-01. Archived from the original on 2009-04-23. Retrieved 2009-05-07.
  10. ^ "BigPond Customer Terms" (PDF). Telstra. 2008-11-06. Archived from the original (PDF) on January 26, 2009. Retrieved 2009-05-08.
  11. ^ Jamieson, Shaun (2001-10-08). "The Ethics and Legality of Port Scanning". SANS. Retrieved 2009-05-08.
  12. ^ Cukier, Michel (2005). "Quantifying Computer Security" (PDF). University of Maryland. Archived from the original (PDF) on 2009-08-24. Retrieved 2009-05-08.
  13. ^ Hon. Abraham N. Tennenbaum (2004-02-29). "Verdict in the case Avi Mizrahi vs. Israeli Police Department of Prosecution" (PDF). Archived from the original (PDF) on 2009-10-07. Retrieved 2009-05-08.
  14. ^ Esa Halmari (2003). "First ruling by the Supreme Court of Finland on attempted break-in". Retrieved 2009-05-07.
  15. ^ UK Parliament (2006-01-25). "Police and Justice Bill - Bill 119". UK Parliament. Retrieved 2011-12-05.
  16. ^ Leyden, John (2008-01-02). "UK gov sets rules for hacker tool ban". The Register. Retrieved 2009-05-08.
  17. ^ "3096th Council meeting Press Release" (PDF). Council of the European Union. 2011-06-10. Retrieved 2011-12-05.
  18. ^ Samson, Martin. "Scott Moulton and Network Installation Computer Services, Inc. v. VC3". Internet Library of Law and Court Decisions. Retrieved 29 April 2021.
  19. ^ Poulsen, Kevin (2000-12-18). "Port scans legal, judge says". SecurityFocus. Retrieved 2009-05-08.
  • Teo, Lawrence (December, 2000). Network Probes Explained: Understanding Port Scans and Ping Sweeps. Linux Journal, Retrieved September 5, 2009, from Linuxjournal.com

Read other articles:

Mikrograf yang menujukkan efek sitopatik akibat virus herpes simpleks. Efek sitopatik atau efek sitopatogenik adalah perubahan atau kelainan struktur yang timbul dalam sel inang yang diakibakan oleh infeksi virus. Contoh efek sitopatik yang dapat terjadi di antaranya adalah pembundaran sel, peleburan dengan sel terdekat membentuk sinkitia, dan munculnya jasad kepungan di nukleus (inti sel) atau sitoplasma.[1] Referensi ^ Baron, Samuel (1996). Medical Microbiology (edisi ke-4th). TX: U...

 

Arrone kota kecilcommune di Italia Tempat categoria:Articles mancats de coordenades Negara berdaulatItaliaRegion di ItaliaUmbraProvinsi di ItaliaProvinsi Terni NegaraItalia Ibu kotaArrone PendudukTotal2.555  (2023 )GeografiLuas wilayah41,04 km² [convert: unit tak dikenal]Ketinggian239 m Berbatasan denganFerentillo Labro (en) Montefranco Morro Reatino (en) Polino Terni SejarahSanto pelindungYohanes Pembaptis Organisasi politikAnggota dariThe most beautiful villages in Italy (en) Inf...

 

IngiloyİngiloylarინგილოებიGadis Ingiloy dari Qakh, AzerbaijanJumlah populasi12.000Daerah dengan populasi signifikan Azerbaijan: 12.000BahasaBahasa Georgia dialek IngiloanKelompok etnik terkaitSubsuku Georgia lainnya Ingiloy[A] (bahasa Georgia: ინგილოები; bahasa Azerbaijan: İngiloylar) adalah kelompok subetnis Georgia yang bahasa ibunya adalah bahasa Georgia dialek Ingiloy/Ingiolan.[3] Ingiloy adalah penduduk asli yang mendiami...

Disambiguazione – Se stai cercando l'accezione in filologia, vedi Lezione (filologia). Questa voce o sezione sull'argomento istruzione è ritenuta da controllare. Motivo: bisognerebbe distinguere la lezione intesa come esposizione accademica dal metodo pedagogico, come fanno le altre wiki (cfr. d:Q603773 e d:Q379833) Partecipa alla discussione e/o correggi la voce. Segui i suggerimenti del progetto di riferimento. Una lezione di algebra lineare alla Helsinki University of Technology L...

 

Letak Distrik Kota Yahatahigashi di Kitakyūshū Distrik Kota Yahatahigashi (八幡東区code: ja is deprecated ) adalah sebuah distrik kota di Kitakyūshū, Fukuoka, Jepang.[1] Yahatahigashi adalah distrik kota terkecil kedua di Kitakyūshū setelah Tobata dengan luas hanya 36,36 kilometer persegi. Penduduk setempat memiliki salah satu rata-rata usia tertinggi di Jepang. Penduduk berjumlah 77.077 jiwa pada akhir September 2003. Referensi ^ 八幡東区. 北九州市 (dalam bahasa Jep...

 

Major newspaper of Cleveland, Ohio, U.S. For other uses, see Plain Dealer (disambiguation). The Plain DealerFront page for April 13, 2023TypeDaily newspaperFormatBroadsheetOwner(s)Advance Publications(Newhouse Newspapers)Founded1842; 182 years ago (1842)HeadquartersPlain Dealer Publishing Co4800 Tiedeman RoadBrooklyn, Ohio 44144U.S.41°30′25.5″N 81°40′47.2″W / 41.507083°N 81.679778°W / 41.507083; -81.679778Circulation94,838 Daily171,404 Sun...

Este artículo o sección necesita referencias que aparezcan en una publicación acreditada. Busca fuentes: «Guillaume-Henri Dufour» – noticias · libros · académico · imágenesEste aviso fue puesto el 10 de septiembre de 2011. Guillaume-Henri Dufour Información personalNombre en francés Guillaume Henri Dufour Nacimiento 15 de septiembre de 1787 Constanza (principado episcopal de Constanza) Fallecimiento 14 de julio de 1875 (87 años)Eaux-Vives (Suiza) Sepultura C...

 

This section tabulates the heads of qualification in a form suitable to be filled in as events progress. The full qualification rules[1] for basketball published by FIBA contain intricate conditions too lengthy for inclusion in Wikipedia. Basketball at the2024 Summer OlympicsBasketballQualificationmenwomenTournamentmenwomenRostersmenwomen3x3 basketballQualificationmenwomenTournamentmenwomenvte The women's 3x3 qualification for the Olympic basketball tournament occured between Novembe...

 

American biologist Eric Francis WieschausEric F. Wieschaus in 2011Born (1947-06-08) June 8, 1947 (age 77)South Bend, IndianaNationalityAmericanAlma materUniversity of Notre Dame (B.S.)Yale University (Ph.D.)Known forEmbryogenesisAwardsGenetics Society of America Medal (1995)Nobel Prize in Physiology or Medicine (1995)Scientific careerFieldsDevelopmental biologyInstitutionsPrinceton UniversityRobert Wood Johnson Medical School Eric Francis Wieschaus (born June 8, 1947 in South B...

Pan American Game Sporting event delegationSaint Vincent and the Grenadines at the2003 Pan American GamesIOC codeVINNOCThe St. Vincent and the Grenadines National Olympic CommitteeWebsitewww.svgnoc.orgin Santo Domingo1–17 August 2003MedalsRanked 32nd Gold 0 Silver 0 Bronze 0 Total 0 Pan American Games appearances (overview)199119951999200320072011201520192023 Saint Vincent and the Grenadines participated at the 2003 Pan American Games, held in Santo Domingo, Dominican Republic, from 1 to 17...

 

This article includes a list of references, related reading, or external links, but its sources remain unclear because it lacks inline citations. Please help improve this article by introducing more precise citations. (January 2013) (Learn how and when to remove this message) Shoet in Yad La-Shiryon museum, Israel. Shoet is a six-wheeled Israeli armored personnel carrier developed by Nimda Group, loosely modeled after the Soviet BTR-152. The vehicle passed tests with the Israel Defense Forces...

 

Children's baseball tournament 1956 Little League World SeriesTournament detailsDatesAugust 21–August 24Teams8Final positionsChampions Lions Hondo Little LeagueRoswell, New MexicoRunner-up Delaware Township Little LeagueDelaware Township, New Jersey← 19551957 → The 1956 Little League World Series was held from August 21 to August 24 in Williamsport, Pennsylvania.[1] The Lions Hondo Little League of Roswell, New Mexico, defeated the Delaware Township Little Leag...

Defunct flying squadron of the Royal Air Force No. 191 Squadron RAFActive6 Nov 1917 – Jan 1919 17 May 1943 – 15 Jun 1945Country United KingdomBranch Royal Air ForceMotto(s)Latin: Vidi Vici(I saw, I conquered)[1][2]CommandersNotablecommandersArthur Travers Harris[3]InsigniaSquadron Badge heraldryA dolphin[1][2]Squadron CodesNo codes known to have been used[1]Military unit No. 191 Squadron was a Royal Air Force squadron. During World War I it ...

 

Play by George Bernard Shaw Fanny's First PlayWritten byGeorge Bernard ShawDate premiered19 April 1911Place premieredLittle Theatre in the Adelphi, LondonOriginal languageEnglishSubjectTwo respectable families learn to cope with wayward childrenGenresatirical comedySettingA country house; residences in Denmark Hill Fanny's First Play is a 1911 play by George Bernard Shaw. It was first performed as an anonymous piece, the authorship of which was to be kept secret. However, critics soon recogni...

 

Jim McMahon Jim McMahon en 1988.Datos personalesNacimiento Jersey City (Estados Unidos)21 de agosto de 1959 (64 años) Jersey City, Nueva JerseyNacionalidad(es) EstadounidenseCarrera deportivaDeporte Fútbol americanoEquipo universitario Brigham YoungEstado RetiradoClub profesionalDraft de la NFL 1982 Ronda: 1 Selección global: 5Debut deportivo 1982Posición QBDorsal(es) 9TDs-Intercepciones 100-90Yardas 18,148Eficiencia de pase 78.2Retirada deportiva 1996Trayectoria Chicago Bears (1982-...

Garrett HedlundLahirGarrett John Hedlund3 September 1984 (umur 39)Roseau, Minnesota, Amerika SerikatPekerjaanAktor, penyanyiTahun aktif2003–sekarang Garrett John Hedlund (lahir 3 September 1984) adalah aktor asal Amerika Serikat dia terkenal karena perannya di film Troy, Friday Night Lights, Four Brothers, Eragon, Country Strong, dan sebagai Sam Flynn di film Tron: Legacy. Hedlund memiliki seorang putra dengan Emma Roberts, yang lahir pada 27 Desember 2020 dan diberi nama Rhodes ...

 

Port St. Joe redirects here. For the Brothers Osborne album, see Port Saint Joe (album). City in Florida, United StatesPort St. Joe, FloridaCityCity of Port St. JoePort St. Joe City HallNickname: St. JoeMotto(s): The Constitution CityBirthplace of the Florida ConstitutionIn God We TrustLocation in Gulf County and the state of FloridaCoordinates: 29°48′53″N 85°17′50″W / 29.81472°N 85.29722°W / 29.81472; -85.29722Country United StatesState ...

 

American Nazi propagandist (1900–1988) Mildred GillarsGillars's prison photo, 1949BornMildred Elizabeth Sisk(1900-11-29)November 29, 1900Portland, Maine, U.S.DiedJune 25, 1988(1988-06-25) (aged 87)Columbus, Ohio, U.S.Resting placeSaint Joseph Cemetery, ColumbusOther namesMidge at the MikeAxis SallyOccupationRadio broadcasterYears active1940–1945Known forPresenting Nazi propaganda on German State Radio, directed to U.S. troops and audience, during World War IICriminal s...

Platform for changing a child's diaper This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Changing table – news · newspapers · books · scholar · JSTOR (September 2014) (Learn how and when to remove this message) A changing table A changing table is a small raised platform designed to allow a person to change a ...

 

Not to be confused with Surrey Hills. Suburb of Sydney, New South Wales, AustraliaSurry HillsSydney, New South WalesSurry Hills Library and Community CentreSurry HillsCoordinates33°53′10″S 151°12′40″E / 33.88611°S 151.21111°E / -33.88611; 151.21111Population15,828 (SAL 2021)[1]Postcode(s)2010Elevation51 m (167 ft)Area1.2 km2 (0.5 sq mi)Location1 km (1 mi) SE of Sydney central business districtLGA(s)City of Syd...