Presentation is loading. Please wait.

Presentation is loading. Please wait.

-sI Idlescan Greatest stealth of any nmap scan

Similar presentations


Presentation on theme: "-sI Idlescan Greatest stealth of any nmap scan"— Presentation transcript:

1 -sI Idlescan Greatest stealth of any nmap scan
- Completely “blind” scanning - no packets are sent to target from machine running nmap Investigate IP-based trust relationships of target network

2 Idlescan technique Exploits OS’s that predictably increment their fragmentation ID numbers (IPID) whenever they send a packet Zombie used to mask the original source of the scan must have this property - excludes OpenBSD, Solaris, recent Linux A Zombie candidate must also be “idle” - no network traffic during scan other than communication with nmap machine - nmap will rely on IPID number of zombie to determine how the target has responded to the zombie with respect to the forged portscan Zombie must be susceptible to responding to SYN/ACK packet with a RST packet which nmap derives the IPID from Nmap automatically tests reliability of zombie

3


Download ppt "-sI Idlescan Greatest stealth of any nmap scan"

Similar presentations


Ads by Google