Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

A review of port scanning techniques

Published: 01 April 1999 Publication History

Abstract

This paper reports the most important techniques used by TCP port scanners. TCP port scanners are specialized programs used to determine what TCP ports of a host have processes listening on them for possible connections. Since these ports characterize, in part, the amount of exposure of the hosts to potential external attacks, knowing their existence is a fundamental matter for network and/or security administrators. Moreover, as scanners are also used by hackers, administrators need to know how they work and what possible weakness they exploit to be able to prevent unwanted scanning or at least to record each scanning attempt.

References

[1]
W. R. Stevens, TCP/IP Illustrated, Vol. 1. Addison-Wesley, 1994.
[2]
W. R. Stevens, TCP/IP Illustrated, Vol. 2. Addison-Wesley, 1995.
[3]
Daemon9, Project Neptune. Phrack Magazine, Issue 48, 1996.
[4]
RFC 793, TRANSMISSION CONTROL PROTOCOL, PROTOCOL SPECIFICATION, pp. 64.
[5]
L. Granquist, Port 0 Scanning, Bugtraq mailing list archives, 8 Jul 1998.
[6]
D. Comer, Internetworking with TCP/IP Vol. 3, Second Edition. Prentice Hall, 1996.
[7]
D. Atkins et al., Internet Security, Second Edition. New Riders, 1997, pp. 413.
[8]
Uriel Maimon, Port Scanning without the SYN flag, TCP port Stealth Scanning. Phrack Magazine, Issue 49, 1996.
[9]
NMAP, http://www.insecure.org/nmap/index.html, 1999.
[10]
S. Sanfilippo, New TCP Scan Method. Bugtraq mailing list archives, 18 Dec 1998.
[11]
M. de Vivo, G. de Vivo, G. Isern, Internet Security Attacks at the Basic Levels. Operating Systems Review, Vol. 32, No. 2. SIGOPS, ACM, April 1998.
[12]
SHADOW Indications Technical Analysis, Coordinated Attacks and Probes. Naval Surface Warfare Center Dahlgren Division, Code CD2S, http://www.nswc.navy.mil/ISSEC/CID/ Sep 1998, Updated Dec 98 and Mar 99.
[13]
Back Orifice, http://www.cultdeadcow.com, 1999.
[14]
D. Comer, Internetworking with TCP/IP Vol. 1. Prentice Hall, Third Edition, 1995, pp. 123-137.
[15]
IdentTCPscan, www.asmodeus.com/archive/crack-scan/.
[16]
RFC 1413, Identification Protocol.
[17]
RFC 959, FILE TRANSFER PROTOCOL (FTP).
[18]
The FTP Bounce Attack, ftp://avian.org/random/ftp-attack.
[19]
Anonymus, Maximum Security, Second Ed., SAMS, 1998, pp. 174-202.
[20]
Index of /~tattooman/scanners, At www.genocide2600.com/~tattooman/, follow the link to FileArchives, and then to scanners, 1999.
[21]
ISS, http://www.iss.net/, 1999.
[22]
QueSO, http://www.apostols.org/projectz/queso/
[23]
D. Commer, J. C. Lin, Probing TCP Implementations. Department of Computer Sciences, Purdue University, 1994.
[24]
Fyodor, Remote OS detection via TCP/IP Stack FingerPrinting. Phrack Magazine, Volume 8, Issue 54, Dec 25th, 1998. <[email protected]>.

Cited By

View all
  • (2024)"Just a tool, until you stab someone with it": Exploring Reddit Users' Questions and Advice on the Legality of Port ScansProceedings of the 2024 European Symposium on Usable Security10.1145/3688459.3688469(322-336)Online publication date: 30-Sep-2024
  • (2024)ZPredict: ML-Based IPID Side-channel MeasurementsACM Transactions on Privacy and Security10.1145/367256027:4(1-33)Online publication date: 20-Jun-2024
  • (2024)Stealthy Misreporting Attacks Against Load BalancingIEEE/ACM Transactions on Networking10.1109/TNET.2024.339638732:4(3622-3635)Online publication date: Aug-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGCOMM Computer Communication Review
ACM SIGCOMM Computer Communication Review  Volume 29, Issue 2
April 1999
95 pages
ISSN:0146-4833
DOI:10.1145/505733
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 April 1999
Published in SIGCOMM-CCR Volume 29, Issue 2

Check for updates

Author Tags

  1. Coordinated Scanning
  2. Decoy Scanning
  3. FIN Scanning
  4. Fingerprinting
  5. Indirect Scanning
  6. SYN Scanning
  7. Stealth Scanning
  8. TCP/IP
  9. Three-way Handshake
  10. UDP

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)691
  • Downloads (Last 6 weeks)71
Reflects downloads up to 27 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)"Just a tool, until you stab someone with it": Exploring Reddit Users' Questions and Advice on the Legality of Port ScansProceedings of the 2024 European Symposium on Usable Security10.1145/3688459.3688469(322-336)Online publication date: 30-Sep-2024
  • (2024)ZPredict: ML-Based IPID Side-channel MeasurementsACM Transactions on Privacy and Security10.1145/367256027:4(1-33)Online publication date: 20-Jun-2024
  • (2024)Stealthy Misreporting Attacks Against Load BalancingIEEE/ACM Transactions on Networking10.1109/TNET.2024.339638732:4(3622-3635)Online publication date: Aug-2024
  • (2024)Significance Of Algorithm Development In Open Port Discovery For Cybersecurity2024 International Conference on Innovations and Challenges in Emerging Technologies (ICICET)10.1109/ICICET59348.2024.10616298(1-3)Online publication date: 7-Jun-2024
  • (2024)Security assessment and improvement of building ethernet KNXnet/IP protocolDiscover Applied Sciences10.1007/s42452-024-05707-66:4Online publication date: 23-Mar-2024
  • (2023)Security Issues, Attacks and Countermeasures in Layered IoT EcosystemInternational Journal of Next-Generation Computing10.47164/ijngc.v14i2.892Online publication date: 31-Mar-2023
  • (2023)Modeling Intruder Reconnaissance Behavior through State Diagrams to Support Defensive DeceptionJournal of Cybersecurity and Privacy10.3390/jcp30200153:2(275-302)Online publication date: 14-Jun-2023
  • (2023)Hybrid Intrusion Detection Using the AEN Graph ModelAdvances in Science, Technology and Engineering Systems Journal10.25046/aj0802068:2(44-63)Online publication date: Mar-2023
  • (2023)Encrypted Traffic Classification for Early-Stage Anomaly Detection in Power Grid Communication Network2023 IEEE PES Innovative Smart Grid Technologies Europe (ISGT EUROPE)10.1109/ISGTEUROPE56780.2023.10407155(1-6)Online publication date: 23-Oct-2023
  • (2023)Analysing Cyber Security Vulnerabilities using Click Jacking and HostHeader Injection2023 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE)10.1109/IITCEE57236.2023.10090465(1-5)Online publication date: 27-Jan-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media