For example nmap can randomize the list of scanned ports. I guess, that is supposed to confuse people :) Le 24/09/2013 16:34, Fabio a écrit : > Il 24/09/13 14:49, silence_is_best@xxxxxxxxxxxx ha scritto: >> Can someone explain the point of a SYN ACK scan to random high ports? I >> usually see a fair amount of these...at first I thought it was maybe a >> block to an initiating SYN packet, but I don't see any evidence that the >> SYN ACK isn't the first packet seen. Danke. > > > Typically an ACK or SYN ACK scan is used to map out firewall rulesets, > determining whether they are stateful or not and which ports are filtered. > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > >
Attachment:
signature.asc
Description: OpenPGP digital signature
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/