Chapter 30 ADP
30.8.1 Port ScanningAn attacker scans device(s) to determine what types of network protocols or services a device supports. One of the most common port scanning tools in use today is Nmap.
Many connection attempts to different ports (services) may indicate a port scan. These are some port scan types:
•TCP Portscan
•UDP Portscan
•IP Portscan
An IP port scan searches not only for TCP, UDP and ICMP protocols in use by the remote computer, but also additional IP protocols such as EGP (Exterior Gateway Protocol) or IGP (Interior Gateway Protocol). Determining these additional protocols can help reveal if the destination device is a workstation, a printer, or a router.
30.8.1.1 Decoy Port Scans
Decoy port scans are scans where the attacker has spoofed the source address. These are some decoy scan types:
•TCP Decoy Portscan
•UDP Decoy Portscan
•IP Decoy Portscan
30.8.1.2Distributed Port Scans
Distributed port scans are
•TCP Distributed Portscan
•UDP Distributed Portscan
•IP Distributed Portscan
30.8.1.3Port Sweeps
Many different connection attempts to the same port (service) may indicate a port sweep, that is, they are
•TCP Portsweep
•UDP Portsweep
•IP Portsweep
•ICMP Portsweep
| 451 |
ZyWALL USG 300 User’s Guide | |
|
|