- Kali Linux:An Ethical Hacker's Cookbook
- Himanshu Sharma
- 139字
- 2021-07-08 09:41:23
How it works...
Idle scan works on the basis of a predictable IPID or an IP fragmentation ID of the zombie host. First, the IPID of the zombie host is checked and then a connection request is spoofed from that host to the target host. If the port is open, an acknowledgment is sent back to the zombie host which resets (RST) the connection as it has no history of opening such a connection. Next, the attacker checks the IPID on the zombie again; if it has changed by one step it implies an RST was received from the target. But if the IPID has changed by two steps it means a packet was received by the zombie host from the target host and there was an RST on the zombie host, which implies that the port is open.
推薦閱讀
- Three.js開發指南:基于WebGL和HTML5在網頁上渲染3D圖形和動畫(原書第3版)
- C/C++常用算法手冊(第3版)
- Python高效開發實戰:Django、Tornado、Flask、Twisted(第3版)
- PHP+MySQL+Dreamweaver動態網站開發實例教程
- 概率成形編碼調制技術理論及應用
- Responsive Web Design by Example
- 單片機應用與調試項目教程(C語言版)
- App Inventor創意趣味編程進階
- JavaScript應用開發實踐指南
- Scala編程實戰
- ASP.NET求職寶典
- Android移動應用開發項目教程
- Software-Defined Networking with OpenFlow(Second Edition)
- Apache Solr for Indexing Data
- 小學生C++趣味編程從入門到精通