How does a SYN scan work?

What will be an ideal response?


In a normal TCP session, a packet is sent to another computer with the SYN flag set. The receiving computer sends back a packet with the SYN/ACK flag set, indicating an acknowledgment. The sending computer then sends a packet with the ACK flag set. If the port to which the SYN packet is sent is closed, the computer responds to the SYN packet with an RST/ACK packet. If a SYN/ACK packet is received by an attacker's computer, it quickly responds with an RST/ACK packet, closing the session. This is done so that a full TCP connection is never made and logged as a transaction. In this sense, it is "stealthy." After all, you don't want a transaction to be logged showing the IP address that connected to the attacked computer.

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1) Insertion into a linked list takes the same number of operations no matter where the insertion occurs 2) A stack is a first-in-first-out data structure. 3) A queue is first-in-first-out data structure. 4) Most applications that use a stack will store a struct or class object on the stack.

Computer Science & Information Technology

Report ________ are a method of visually displaying data in reports

Fill in the blank(s) with correct word

Computer Science & Information Technology

If a column of data holds the letter grades for a class, the ________ function could be used to determine how many students had a grade of "A"

A) COUNTIF B) MEDIAN C) IF D) SUM

Computer Science & Information Technology

Once workbook sharing is removed, the contents of the tracking log are _______, and there is no way to retrieve the history of edits made to the document.

A. saved B. copied C. erased D. backed up

Computer Science & Information Technology