EHPT Module 03
EHPT Module 03
and Penetration
Testing
UNIT 3
Foot printing and scanning
If the target system's port is closed, the idle scan process proceeds
similarly initially:
1. The attacker sends an IPID probe to the idle host and receives an IPID value
(e.g., 12345).
2. The attacker sends a spoofed SYN packet to the victim, appearing to come from
the idle host.
3. Because the port on the victim's system is closed, it responds with an RST, and
no further communication occurs between the victim and the idle host.
4. The attacker sends another IPID probe to the idle host and receives the
updated IPID (e.g., 12346).
Since the IPID is only incremented by one, the attacker can deduce
that the port on the victim's system is closed.
Defense Techniques:
• Changing or obscuring banner information can slow attackers.
• In Linux, disable server signatures in httpd.conf.
• In Windows, use UrlScan to remove or alter server identity headers.