×
Create a new article
Write your page title here:
We currently have 3,189 articles on s23. Type your article name above or create one of the articles listed here!



    s23
    3,189Articles

    Port scanner: Difference between revisions

    Content added Content deleted
    imported>mutante
    mNo edit summary
    imported>mutante
    mNo edit summary
    Line 1: Line 1:
    Port scanner
    Port scanner


    A software utility, used by hackers as well as system testers and software engineers, to determine if a particular TCP service is running on a particular host system. In a typical configuration the port scanner will scan through all of the "well known ports" (port numbers up to 1024) in the TCP protocol, in order to elicit a response from the server. The scanner works on the principle that if the port is open on the server then some form of response will be forthcoming. The method is used to 'enumerate' or list the services running that may be targets for some form of exploitation.
    A [[software]] utility, used by [[hacker]]s as well as system testers and software engineers, to determine if a particular [[TCP]] service is running on a particular host system. In a typical configuration the port scanner will scan through all of the "well known [[ports]]" (port numbers up to 1024) in the [[TCP]] protocol, in order to elicit a response from the [[server]]. The scanner works on the principle that if the port is open on the server then some form of response will be forthcoming. The method is used to 'enumerate' or list the services running that may be targets for some form of exploitation.


    Many firewall and other security systems will watch for multiple rapid requests from a single host to connect to target ports and will report this suspicious behavior to the system administrator. For this reason a second generation of port scanners known as 'Stealth Scanners' was created. Stealth scanners will attempt to disguise the scan either by conducting it very slowly over a long period of time, or perhaps sending some request other than a connection request in order to confuse the target.
    Many [[firewall]] and other security systems will watch for multiple rapid requests from a single host to connect to target ports and will report this suspicious behavior to the system administrator. For this reason a second generation of port scanners known as 'Stealth Scanners' was created. Stealth scanners will attempt to disguise the scan either by conducting it very slowly over a long period of time, or perhaps sending some request other than a connection request in order to confuse the target.


    http://www.itsecurity.com/dictionary/portscan.htm
    http://www.itsecurity.com/dictionary/portscan.htm
    Line 9: Line 9:
    PortScanners:
    PortScanners:


    NmAp, the Number 1




    http://www.insecure.org/nmap/
    * [[Nmap]], the Number 1 http://www.insecure.org/nmap/


    [[SACScan]]
    <a href="http://seti23.org/wiki.pl?SACScan">SACScan</a>


    [[Nessus]]
    NesSus


    http://www.glocksoft.com/portscanf.htm
    * http://www.glocksoft.com/portscanf.htm


    Online portscanner:
    Online portscanner:


    http://www.computercops.biz/modules.php?name=nmap
    * http://www.computercops.biz/modules.php?name=nmap


    http://www.khine.de/tools/portscan
    * http://www.khine.de/tools/portscan




    Line 33: Line 32:




    also see ->> PortScanning , NmAp , SACScan , NesSus
    also see ->> [[PortScanning]] , [[Nmap]] , [[SACScan]] , [[Nessus]]





    Revision as of 22:02, 22 February 2005

    Port scanner

    A software utility, used by hackers as well as system testers and software engineers, to determine if a particular TCP service is running on a particular host system. In a typical configuration the port scanner will scan through all of the "well known ports" (port numbers up to 1024) in the TCP protocol, in order to elicit a response from the server. The scanner works on the principle that if the port is open on the server then some form of response will be forthcoming. The method is used to 'enumerate' or list the services running that may be targets for some form of exploitation.

    Many firewall and other security systems will watch for multiple rapid requests from a single host to connect to target ports and will report this suspicious behavior to the system administrator. For this reason a second generation of port scanners known as 'Stealth Scanners' was created. Stealth scanners will attempt to disguise the scan either by conducting it very slowly over a long period of time, or perhaps sending some request other than a connection request in order to confuse the target.

    http://www.itsecurity.com/dictionary/portscan.htm

    PortScanners:


    SACScan

    Nessus

    Online portscanner:


    Trojan Ports:

    http://www.glocksoft.com/trojan_port.htm http://www.iana.org/assignments/port-numbers


    also see ->> PortScanning , Nmap , SACScan , Nessus

    Cookies help us deliver our services. By using our services, you agree to our use of cookies.
    Cookies help us deliver our services. By using our services, you agree to our use of cookies.