First page Back Continue Last page Summary Graphics
Stealth Scans
Used to identify the operating system,
to get passed some firewalls, and
to map networks
Different operating systems respond differently to impossible TCP state flag combinations
Most systems don't log errant packets until the TCP connection is established. By sending impossible combinations without an established connection, event logging mechanisms can be by-passed.
Notes: