What port scanning method involves sending spoofed packets to a target system and then looking for adjustments to the IPID on a zombie system?

What port scanning method involves sending spoofed packets to a target system and then looking for adjustments to the IPID on a zombie system?

What port scanning method involves sending spoofed packets to a target system and then looking for adjustments to the IPID on a zombie system?

A.
Blind Port Scanning

B.
Idle Scanning

C.
Bounce Scanning

D.
Stealth Scanning

E.
UDP Scanning

Explanation:
from NMAP:-sI <zombie host[:probeport]> Idlescan: This advanced scan method allows fora truly blind TCP port scan of the target (meaning no packets are sent tothe tar- get from your real IP address). Instead, a unique side-channelattack exploits predictable "IP fragmentation ID" sequence generation onthe zombie host to glean information about the open ports on the target.



Leave a Reply 0

Your email address will not be published. Required fields are marked *