imported>mutante mNo edit summary |
imported>mutante mNo edit summary |
||
Line 1: | Line 1: | ||
Port scanner |
Port scanner |
||
A [[software]] utility, used by [[hacker]]s as well as system testers and software engineers, to determine if a particular [[TCP]] service is running on a particular host system. In a typical configuration the port scanner will scan through all of the "well known [[ports]]" (port numbers up to 1024) in the [[TCP]] protocol, in order to elicit a response from the [[server]]. The scanner works on the principle that if the port is open on the server then some form of response will be forthcoming. The method is used to 'enumerate' or list the services running that may be targets for some form of exploitation. |
|||
Many [[firewall]] and other security systems will watch for multiple rapid requests from a single host to connect to target ports and will report this suspicious behavior to the system administrator. For this reason a second generation of port scanners known as 'Stealth Scanners' was created. Stealth scanners will attempt to disguise the scan either by conducting it very slowly over a long period of time, or perhaps sending some request other than a connection request in order to confuse the target. |
|||
http://www.itsecurity.com/dictionary/portscan.htm |
http://www.itsecurity.com/dictionary/portscan.htm |
||
Line 9: | Line 9: | ||
PortScanners: |
PortScanners: |
||
NmAp, the Number 1 |
|||
http://www.insecure.org/nmap/ |
* [[Nmap]], the Number 1 http://www.insecure.org/nmap/ |
||
[[SACScan]] |
|||
<a href="http://seti23.org/wiki.pl?SACScan">SACScan</a> |
|||
[[Nessus]] |
|||
NesSus |
|||
http://www.glocksoft.com/portscanf.htm |
* http://www.glocksoft.com/portscanf.htm |
||
Online portscanner: |
Online portscanner: |
||
http://www.computercops.biz/modules.php?name=nmap |
* http://www.computercops.biz/modules.php?name=nmap |
||
http://www.khine.de/tools/portscan |
* http://www.khine.de/tools/portscan |
||
Line 33: | Line 32: | ||
also see ->> PortScanning , |
also see ->> [[PortScanning]] , [[Nmap]] , [[SACScan]] , [[Nessus]] |
||
Revision as of 22:02, 22 February 2005
Port scanner
A software utility, used by hackers as well as system testers and software engineers, to determine if a particular TCP service is running on a particular host system. In a typical configuration the port scanner will scan through all of the "well known ports" (port numbers up to 1024) in the TCP protocol, in order to elicit a response from the server. The scanner works on the principle that if the port is open on the server then some form of response will be forthcoming. The method is used to 'enumerate' or list the services running that may be targets for some form of exploitation.
Many firewall and other security systems will watch for multiple rapid requests from a single host to connect to target ports and will report this suspicious behavior to the system administrator. For this reason a second generation of port scanners known as 'Stealth Scanners' was created. Stealth scanners will attempt to disguise the scan either by conducting it very slowly over a long period of time, or perhaps sending some request other than a connection request in order to confuse the target.
http://www.itsecurity.com/dictionary/portscan.htm
PortScanners:
- Nmap, the Number 1 http://www.insecure.org/nmap/
Online portscanner:
Trojan Ports:
http://www.glocksoft.com/trojan_port.htm http://www.iana.org/assignments/port-numbers
also see ->> PortScanning , Nmap , SACScan , Nessus