Skip to content

Commit 0e6843e

Browse files
authored
Update xmas.md
1 parent 3092ad9 commit 0e6843e

File tree

1 file changed

+7
-7
lines changed
  • documentation/modules/auxiliary/scanner/portscan

1 file changed

+7
-7
lines changed

documentation/modules/auxiliary/scanner/portscan/xmas.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,22 @@
1-
#Description
1+
# Description
22

33
This module is used to determine if the ports on target machine are closed. In this scan sends probes containing the FIN, PSH and URG flags.
44

55
This scan is faster and stealthier compared to some other scans.Following action are performed depending on the state of ports -
66

7-
####Open Port:
7+
#### Open Port:
88
Detects an open port via no response to the segment
99

10-
####Closed Port:
10+
#### Closed Port:
1111
Detects that a closed via a RST received in response to the FIN
1212

13-
####Filtered Port:
13+
#### Filtered Port:
1414
Cannot distinguish between a filtered port and an open port
1515

16-
####Unfiltered Port:
16+
#### Unfiltered Port:
1717
Cannot distinguish between an unfiltered port and a non-stateful filtered port
1818

19-
#Vulnerable Application
19+
# Vulnerable Application
2020

2121
XMAS scan requires the use of raw sockets, and thus cannot be performed from some Windows
2222
systems (Windows XP SP 2, for example). On Unix and Linux, raw socket manipulations require root privileges.
@@ -48,7 +48,7 @@ Cannot distinguish between an unfiltered port and a non-stateful filtered port
4848
2. Do: `set RHOSTS [IP]`
4949
3. Do: `set PORTS [PORTS]`
5050
4. Do: `run`
51-
5. The open/filtered ports will be discovered, status will be printed indicating as such.
51+
5. The open/filtered ports will be discovered, status will be printed indicating as such.
5252

5353
# Scenarios
5454

0 commit comments

Comments
 (0)