- Kali Linux:An Ethical Hacker's Cookbook
- Himanshu Sharma
- 139字
- 2021-07-08 09:41:23
How it works...
Idle scan works on the basis of a predictable IPID or an IP fragmentation ID of the zombie host. First, the IPID of the zombie host is checked and then a connection request is spoofed from that host to the target host. If the port is open, an acknowledgment is sent back to the zombie host which resets (RST) the connection as it has no history of opening such a connection. Next, the attacker checks the IPID on the zombie again; if it has changed by one step it implies an RST was received from the target. But if the IPID has changed by two steps it means a packet was received by the zombie host from the target host and there was an RST on the zombie host, which implies that the port is open.
推薦閱讀
- HTML5+CSS3王者歸來
- Learning Scala Programming
- The DevOps 2.3 Toolkit
- C語言程序設(shè)計基礎(chǔ)與實驗指導(dǎo)
- C和C++安全編碼(原書第2版)
- INSTANT Sencha Touch
- 薛定宇教授大講堂(卷Ⅳ):MATLAB最優(yōu)化計算
- JavaScript動態(tài)網(wǎng)頁開發(fā)詳解
- Apache Kafka Quick Start Guide
- MATLAB 2020從入門到精通
- 一塊面包板玩轉(zhuǎn)Arduino編程
- Android Development Tools for Eclipse
- Advanced Python Programming
- C語言程序設(shè)計
- Visual Basic 程序設(shè)計實踐教程