02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

114 Chapter 5 ■ Scanning Networks<br />

To perform an Xmas tree scan with Nmap, enter the following at the command line:<br />

NMAP –sX –v <br />

Current versions of Windows (typically Windows XP or later) do not<br />

respond to this type of attack.<br />

FIN Scan<br />

In this type of scan, the attacker sends frames to the victim with the FIN flag set. The result<br />

is somewhat similar to what happens in a Xmas tree scan. The victim’s response depends<br />

on whether the port is open or closed. Much like the Xmas tree scan, if an FIN is sent to an<br />

open port there is no response, but if the port is closed the victim returns an RST. Figure<br />

5.4 illustrates this process.<br />

FIGURE 5.4 An FIN scan against a closed port and an open port<br />

Host A<br />

FIN + Port<br />

RST<br />

Host B<br />

An FIN scan in Nmap can be performed by issuing the following command:<br />

NMAP –sF <br />

NULL Scan<br />

In this type of scan, the attacker sends frames to the victim with no flag set. The result<br />

is somewhat similar to what happens in an FIN scan. The victim’s response depends on<br />

whether the port is open or closed. Much like the FIN and Xmas tree scans, if no flags are<br />

set on a frame that is sent to an open port there is no response, but if the port is closed, the<br />

victim returns an RST. Figure 5.5 illustrates this process.<br />

FIGURE 5.5 A NULL scan against a closed and an open port<br />

Host A<br />

FIN + Port<br />

Open<br />

Host B<br />

Host A<br />

FIN + Port<br />

RST<br />

Closed<br />

Host B

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!