StealthTCPScanner

所属分类:TCP/IP协议栈
开发工具:Visual C++
文件大小:58KB
下载次数:519
上传日期:2004-06-22 02:22:43
上 传 者wangyu
说明:  SOCKET编程例子3
(Example 3 for SOCKET programming.)

文件列表:
StealthTCPScanner (0, 2004-06-22)
StealthTCPScanner\ClientSocket.cpp (5840, 2001-01-26)
StealthTCPScanner\ClientSocket.h (2012, 2001-01-26)
StealthTCPScanner\res (0, 2004-06-22)
StealthTCPScanner\res\StealthTCPScanner.ico (1078, 2001-01-26)
StealthTCPScanner\res\StealthTCPScanner.rc2 (409, 2001-01-20)
StealthTCPScanner\resource.h (1200, 2001-01-21)
StealthTCPScanner\StdAfx.cpp (219, 2001-01-20)
StealthTCPScanner\StdAfx.h (999, 2001-01-20)
StealthTCPScanner\StealthTCPScanner.aps (37404, 2001-01-26)
StealthTCPScanner\StealthTCPScanner.clw (1864, 2001-01-26)
StealthTCPScanner\StealthTCPScanner.cpp (2184, 2001-01-20)
StealthTCPScanner\StealthTCPScanner.dsp (5568, 2001-01-26)
StealthTCPScanner\StealthTCPScanner.dsw (557, 2001-01-20)
StealthTCPScanner\StealthTCPScanner.exe (45056, 2001-01-26)
StealthTCPScanner\StealthTCPScanner.h (1445, 2001-01-20)
StealthTCPScanner\StealthTCPScanner.ncb (107520, 2001-01-26)
StealthTCPScanner\StealthTCPScanner.opt (52736, 2001-01-26)
StealthTCPScanner\StealthTCPScanner.plg (3713, 2001-01-26)
StealthTCPScanner\StealthTCPScanner.rc (6542, 2001-01-26)
StealthTCPScanner\StealthTCPScannerDlg.cpp (7720, 2001-01-26)
StealthTCPScanner\StealthTCPScannerDlg.h (2031, 2001-01-21)

Index (TCP stealth Scanner) ------------------- 1. How does it work ? 2. Requirments ! 3. Notes. 4. Contact us. 1. How does it work ? --------------------- When using a convetional TCP scanner (active scanner) the scanner will try to connect, and log your address. A stealth scanner (Passive), send out the SYN packet (request) and listens to what is comming back. If it receives an SYN+RST it means there is no one the listens on this port. If it receives an SYN+ACK it means the socket is ready to connect (the OS unaware of the connection we tried to open send back RST packet, because it doens't know about the connection) Since we didn't establish a connection on both cases, the address wasn't loged. (unless the remote site has an IDS system) 2. Requirments ! --------------- Currently working only under w2k. 3. Notes. --------- A. Firewall tends not to send back any info on not listening sockets. B. Do the the scan while the traffic on the interface is low. 4. Contact us. -------------- Site : http://www.komodia.com email : barak@komodia.com

近期下载者

相关文件


收藏者