You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: documentation/modules/auxiliary/scanner/portscan/xmas.md
+4-10Lines changed: 4 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,19 +2,13 @@
2
2
3
3
This module is used to determine if the ports on target machine are closed. It sends probes containing the FIN, PSH and URG flags. Scan is faster and stealthier compared to some other scans. Following action are performed depending on the state of ports -
4
4
5
-
#### Open Port:
6
-
Detects an open port via no response to the segment
5
+
#### OPEN|FILTERED Port:
6
+
Detects open|filtered port via no response to the segment
7
7
8
8
#### Closed Port:
9
-
Detects that a closed via a RST received in response to the FIN
9
+
Detects a closed port via a RST received in response to the FIN
10
10
11
-
#### Filtered Port:
12
-
Cannot distinguish between a filtered port and an open port
13
-
14
-
#### Unfiltered Port:
15
-
Cannot distinguish between an unfiltered port and a non-stateful filtered port
16
-
17
-
# Vulnerable Application
11
+
# Required Permissions
18
12
19
13
XMAS scan requires the use of raw sockets, and thus cannot be performed from some Windows
20
14
systems (Windows XP SP 2, for example). On Unix and Linux, raw socket manipulations require root privileges.
0 commit comments