IPv4 and port scanning techniques: SYN scan, ACK scan, FIN scan, Xmas tree scan.

Table of Contents

  1. SYN Scan
  2. ACK Scan
  3. FIN Scan
  4. Xmas Tree Scan
  5. Best Practices for Port Scanning
  6. Conclusion

SYN Scan

SYN scan is a popular port scanning technique used to identify open ports on a target system. This technique is based on the TCP three-way handshake, which is used to establish a connection between a client and a server. The SYN scan technique involves sending a SYN packet to each port on the target system and waiting for a response.

If a SYN-ACK packet is received in response to the SYN packet, the port is considered open, and the service running on that port is identified. If a RST packet is received in response to the SYN packet, the port is considered closed. If no response is received, the port is considered filtered or blocked by a firewall.

The SYN scan technique is fast and efficient and can be used to identify open ports and potential vulnerabilities on the target system. However, it may be detected by intrusion detection systems or firewalls, which can block or limit the number of SYN packets sent to a target system.

ACK Scan

ACK scan is another port scanning technique that is based on the TCP three-way handshake. This technique involves sending an ACK packet to each port on the target system and waiting for a response.

If a RST packet is received in response to the ACK packet, the port is considered closed. If no response is received, the port is considered filtered or blocked by a firewall. If an unexpected response, such as a SYN-ACK packet, is received in response to the ACK packet, the port is considered open, and the service running on that port is identified.

The ACK scan technique is less commonly used than the SYN scan technique, but it can be useful in identifying open ports that are not detected by SYN scan or other port scanning techniques. However, it may be slower and less reliable than other scanning techniques and may also be detected by intrusion detection systems or firewalls.

FIN Scan

FIN scan is a port scanning technique that involves sending a FIN packet to each port on the target system and waiting for a response.

If a RST packet is received in response to the FIN packet, the port is considered closed. If no response is received, the port is considered filtered or blocked by a firewall. If an unexpected response, such as a SYN-ACK or RST-ACK packet, is received in response to the FIN packet, the port is considered open, and the service running on that port is identified.

The FIN scan technique is less commonly used than SYN scan or ACK scan, but it can be useful in identifying open ports that are not detected by other scanning techniques. However, it may be slower and less reliable than other scanning techniques and may also be detected by intrusion detection systems or firewalls.

Xmas Tree Scan

Xmas Tree Scan is a port scanning technique that involves sending a packet with the FIN, URG, and PSH flags set to each port on the target system and waiting for a response.

If a RST packet is received in response to the Xmas Tree packet, the port is considered closed. If no response is received, the port is considered filtered or blocked by a firewall. If an unexpected response, such as a SYN-ACK or RST-ACK packet, is received in response to the Xmas Tree packet, the port is considered open, and the service running on that port is identified.

The Xmas Tree Scan technique is less commonly used than other scanning techniques and may be less reliable, but it can be useful in identifying open ports that are not detected by other scanning techniques. However, it may also be detected by intrusion detection systems or firewalls.

Best Practices for Port Scanning

Port scanning can be a useful tool for network administrators and security professionals, but it can also be used maliciously to identify vulnerabilities or exploit systems. To ensure that port scanning is conducted ethically and responsibly, it is important to follow best practices, including:

Conclusion

Port scanning is a valuable technique for identifying potential vulnerabilities and securing network systems. By understanding the different port scanning techniques, network administrators and security professionals can effectively identify open ports and services running on a target system, and take necessary steps to secure those systems. However, it is important to conduct port scanning ethically and responsibly and to follow best practices to avoid causing damage or disruption to the target system or network.

Mustafa Enes Akdeniz is a Turkish entrepreneur and software developer, born on May 27, 1997, in Gebze. He holds a degree in Computer Engineering from Kocaeli University. Akdeniz is the founder of Oyun Cevheri, a company focused on providing gaming-related services and products, and is also a co-founder of Centerium LLC, a U.S.-based company involved in internet-related services, including IPv4 broking and trading.

With a strong foundation in networking, Akdeniz has gained substantial experience in network administration, IP management, and cybersecurity. He has worked extensively on IPv4 address allocation, facilitating the purchase and sale of IP blocks for businesses needing to scale their digital infrastructure. His technical expertise in network protocols and routing has been instrumental in managing IPv4.Center, which provides brokerage services for IP resources. He also focuses on network security, ensuring safe and secure IPv4 transactions, and optimizing network performance for clients through advanced technologies.

424 Views
5 min. read
19 Jan 2023

Join our newsletter to keep updated from our news.

×

Your journey starts here; By completing the form below, you're taking the first step towards unlocking exclusive benefits tailored just for you.
Let's get started!

Full name

Email address ( please use corporate email )

I am interested in
Selling
I am interested in
Buying

Which RIR is acceptable?

RIPE
ARIN
APNIC

Which subnet size is acceptable?

/24 ( 256 IP Addresses )
/23 ( 512 IP Addresses )
/22 ( 1024 IP Addresses )
/21 ( 2048 IP Addresses )
/20 ( 4096 IP Addresses )
/19 ( 8192 IP Addresses )
/18 ( 16384 IP Addresses )
/17 ( 32768 IP Addresses )
/16 ( 65536 IP Addresses )
Other (Not in the list)

Select the RIR

RIPE
ARIN
APNIC

Select the subnet size ( select the biggest one if you have multiple subnets )

/24 ( 256 IP Addresses )
/23 ( 512 IP Addresses )
/22 ( 1024 IP Addresses )
/21 ( 2048 IP Addresses )
/20 ( 4096 IP Addresses )
/19 ( 8192 IP Addresses )
/18 ( 16384 IP Addresses )
/17 ( 32768 IP Addresses )
/16 ( 65536 IP Addresses )
Other (Not in the list)

Note

Send the form