Nmap: ACK Scan - Paiet/SEC-335 GitHub Wiki

  • Kathy

    • Used in an attempt to map firewall/filtering rules for target
  • How is that done?

    • Send an ACK and random sequence number
      • NO RESPONSE = filtered
      • RST = not filtered
        • Only works on RFC 793 compliant stacks
    • nmap -sA <targetIP>
  • There are some variations to this type of scan?

    • TTL-based
      • If TLL values are lower than 64
      • nmap -ttl 70 <targetIP>
        • Learn target's TTL through packet inspection
          • --packet-trace
          • --reason
    • Window-based
      • All about the window size
        • If target returns
          • RST + Non-Zero Window = Port OPEN
          • RST + Zero Window = Port CLOSED
          • No Response = FILTERED
            • Can't really trust this scan as the OS may not be compliant
              • See man nmap and search for -sW
⚠️ **GitHub.com Fallback** ⚠️