Lost universe of Programing
Would you like to react to this message? Create an account in a few clicks or log in to continue.

Lost universe of Programing

USERNAME :- Forum Post:-114
 
HomePortalGalleryLatest imagesRegisterLog in

 

 UDP Scan (scanning and footprinting) 11

Go down 
AuthorMessage
Er Amit Tripathi

Er Amit Tripathi


Male
Number of posts : 37
Age : 38
Location : Lucknow
Job/hobbies : Software Engeener
What U like To do ? : I Rocks With Computer System.
Registration date : 2008-01-09

UDP Scan (scanning and footprinting)  11 Empty
PostSubject: UDP Scan (scanning and footprinting) 11   UDP Scan (scanning and footprinting)  11 I_icon_minitime2/10/2008, 2:37 am

We have seen how private ports are assigned at the higher end and UDP
scans try to detect the state of the port by transmitting a zero byte
UDP packet to the target system and the concerned port. An open port
does not respond, while a closed port will reply with an ICMP HOST
UNREACHABLE response. Similar to inverse mapping, the absence of evidence
is considered as the evidence of presence. The disadvantage to the
attacker is that UDP is a connectionless protocol and unlike TCP does
not retransmit packets if they are lost or dropped on the network.
Moreover, it is easily detected and unreliable (false positives). Linux
kernels limit ICMP error message rates, with destination unreachable
set to 80 per 4 seconds, thereafter implementing a 1/4 second penalty
if the count is exceeded. This makes the scan slow and moreover the
scan requires root access. However, it avoids TCP based IDS and can
scan non-TCP ports.
Back to top Go down
http://www.aspx.forumotion.com
 
UDP Scan (scanning and footprinting) 11
Back to top 
Page 1 of 1
 Similar topics
-
» Port Scanning (Scanning and Footprinting) 7
» SCANNING AND FOOTPRINTING 1
» TRACEROOT (SCANNING AND FOOTPRINTING) 5
» Nmap (scanning and Footprinting) 9
» DNS Enumeration (SCANNING AND FOOTPRINTING) 3

Permissions in this forum:You cannot reply to topics in this forum
Lost universe of Programing :: --=| TUTORIALS |=-- :: ETHICAL HACKING & NETWORKING-
Jump to: