How does IP protocol scanning work?

What will be an ideal response?


IP protocol scanning examines a target host for supported IP protocols. In this method, the scanner transmits IP packets to each protocol on the target host. If a protocol on the target host replies with an ICMP unreachable message to the scanner, then the target host does not use that protocol. If there is no reply, then the hacker assumes that the target host supports that protocol. Unfortunately for the hacker, firewalls and computers that run operating systems such as Digital UNIX (now replaced with Compaq Tru64 Operating System) and HP-UX do not send any ICMP unreachable messages. Consequently, the IP protocols supported by such hosts cannot be determined by using IP protocol scanning. Fortunately for the script kiddie population, the number of Digital UNIX,Tru64, and HP-UX servers is relatively small.

Computer Science & Information Technology

You might also like to view...

The __________ policy is to select the disk I/O request that requires the least movement of the disk arm from its current position.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Comments can display on the left or right of the page

Indicate whether the statement is true or false

Computer Science & Information Technology

Including keyword phrases instead of single keywords as part of your metatags will help to increase traffic to your website.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A package that includes hardware, software, and support from a single vendor is called a(n) ____ package.

A. model B. prototype C. turnkey D. integrated

Computer Science & Information Technology