- Kali Linux:An Ethical Hacker's Cookbook
- Himanshu Sharma
- 139字
- 2021-07-08 09:41:23
How it works...
Idle scan works on the basis of a predictable IPID or an IP fragmentation ID of the zombie host. First, the IPID of the zombie host is checked and then a connection request is spoofed from that host to the target host. If the port is open, an acknowledgment is sent back to the zombie host which resets (RST) the connection as it has no history of opening such a connection. Next, the attacker checks the IPID on the zombie again; if it has changed by one step it implies an RST was received from the target. But if the IPID has changed by two steps it means a packet was received by the zombie host from the target host and there was an RST on the zombie host, which implies that the port is open.
推薦閱讀
- 極簡算法史:從數學到機器的故事
- Kali Linux Web Penetration Testing Cookbook
- Visual C++實例精通
- 精通軟件性能測試與LoadRunner實戰(第2版)
- 云計算通俗講義(第3版)
- PostgreSQL 11從入門到精通(視頻教學版)
- Microsoft Dynamics GP 2013 Reporting, Second Edition
- 零基礎學Python數據分析(升級版)
- 快速入門與進階:Creo 4·0全實例精講
- Python:Deeper Insights into Machine Learning
- Zabbix Performance Tuning
- 代碼閱讀
- 區塊鏈架構之美:從比特幣、以太坊、超級賬本看區塊鏈架構設計
- Python 3 Object:oriented Programming(Second Edition)
- ASP.NET 4.0 Web程序設計