Ports
The network stack behaves differently whether the ports are open or closed
TCP: replies with a TCP SYN, ACK (if open), or TCP RST (if closed).
UDP: replies with a Higher Layer packet (if open), or an ICMP Port unreachable (if closed).
ICMP: replies with ICMP Reply (or other).
Firewalls also affect replies by altering or filtering packets.
Services typically operate on well-known ports.
All ports below 1024 are reserved for popular services.
Many ports above 1024 are also reserved.
Impact: Allows knowing which services/hosts are available.
Information leakage
Port scan: try to initiate a connection to a specific port.
May effectively initiate the connection or may simply start initiating it.
Full Connection: Doing the TCP Three-Way Handshake.
Half Connection: Only sending the first TCP SYN.
A reply may indicate the existence/absence of a service.
Existence if the connection is successful.
Absence if an error is received.
A non-reply may indicate the existence of a firewall.
Mitigation
Mitigation is limited as it exploits an inherent behavior.
The network port state will affect the replies.
Firewalls should observe connect attempts and limit them on the detection of enumeration.
Number of connections from a given host.
Different ports are being accessed.
Session duration.
Rate of packets.
Specific fingerprints.
Last updated