Karen was running Nmap port scans on each machine of her network to identify suspicious ports on the target machines. She observed that there are some ports that neither sent RST packet or ACK packet in response to the packet sent by Nmap. What should she interpret for the ports that did not return the acknowledgment?


Karen was running Nmap port scans on each machine of her network to identify suspicious ports on the target machines. She observed that there are some ports that neither sent RST packet or ACK packet in response to the packet sent by Nmap. What should she interpret for the ports that did not return the acknowledgment?



A. She should treat those ports as Half Open ports
B. She should treat those ports as Open ports
C. She should treat those ports as Closed ports
D. She should treat those ports as filtered ports

Comments

  1. The nmap documentation states the following for `NULL, FIN and Xmas scans:

    When scanning systems compliant with this RFC text, any packet not containing SYN, RST, or ACK bits will result in a returned RST if the port is closed and no response at all if the port is open. As long as none of those three bits are included, any combination of the other three (FIN, PSH, and URG) are OK.

    ReplyDelete

Post a Comment

Popular posts from this blog

George works at 3D-Networks Ltd as a Network Admin. He received an email from one of his clients stating that the client’s company website has some flaws and they are receiving continuous emails from customers about the inconveniencies. While checking the web servers, he found loopholes with the DNS servers and he installed DNSSEC-Aware lookups. This made the site functional and the client was happy with the outcome. What problem does a Non-DNSSEC-Aware site face?

An organization recently faced a cyberattack where an attacker captured legitimate user credentials and gained access to the critical information systems. He also led other malicious hackers in gaining access to the information systems. To defend and prevent such attacks in future, the organization has decided to route all the incoming and outgoing network traffic through a centralized access proxy apart from validating user credentials. Which of the following defensive mechanisms the organization is trying to strengthen?

You have compromised a server on a network and successfully opened a shell. You aimed to identify all operating systems running on the network. However, as you attempt to fingerprint all machines in the network using the nmap syntax below, it is not going through. invictus@victim_server:~$ nmap -T4 -O 10.10.0.0/24 TCP/IP fingerprinting (for OS scan) xxxxxxx xxxxxx xxxxxxxxx. QUITTING! What seems to be wrong?