File tree Expand file tree Collapse file tree 1 file changed +7
-7
lines changed
documentation/modules/auxiliary/scanner/portscan Expand file tree Collapse file tree 1 file changed +7
-7
lines changed Original file line number Diff line number Diff line change 1
- #Description
1
+ # Description
2
2
3
3
This module is used to determine if the ports on target machine are closed. In this scan sends probes containing the FIN, PSH and URG flags.
4
4
5
5
This scan is faster and stealthier compared to some other scans.Following action are performed depending on the state of ports -
6
6
7
- ####Open Port:
7
+ #### Open Port:
8
8
Detects an open port via no response to the segment
9
9
10
- ####Closed Port:
10
+ #### Closed Port:
11
11
Detects that a closed via a RST received in response to the FIN
12
12
13
- ####Filtered Port:
13
+ #### Filtered Port:
14
14
Cannot distinguish between a filtered port and an open port
15
15
16
- ####Unfiltered Port:
16
+ #### Unfiltered Port:
17
17
Cannot distinguish between an unfiltered port and a non-stateful filtered port
18
18
19
- #Vulnerable Application
19
+ # Vulnerable Application
20
20
21
21
XMAS scan requires the use of raw sockets, and thus cannot be performed from some Windows
22
22
systems (Windows XP SP 2, for example). On Unix and Linux, raw socket manipulations require root privileges.
@@ -48,7 +48,7 @@ Cannot distinguish between an unfiltered port and a non-stateful filtered port
48
48
2 . Do: ` set RHOSTS [IP] `
49
49
3 . Do: ` set PORTS [PORTS] `
50
50
4 . Do: ` run `
51
- 5 . The open/filtered ports will be discovered, status will be printed indicating as such.
51
+ 5 . The open/filtered ports will be discovered, status will be printed indicating as such.
52
52
53
53
# Scenarios
54
54
You can’t perform that action at this time.
0 commit comments