In addition to its relative speed in comparison with other types of scans, the major advantage a TCP FIN Scan is its ability to scan through stateless firewall or ACL filters. Such filters are configured to block access to ports usually by preventing SYN packets, thus stopping any attempt to 'build' a connection. FIN packets, like out-of-state ACK packets, tend to pass through such devices undetected. FIN scanning is still relatively stealthy as the packets tend to blend in with the background noise on a network link.
Nature | Type | ID | Name |
---|---|---|---|
ChildOf | S | 300 | Port Scanning |
An adversary sends TCP packets with the FIN flag but not associated with an existing connection to target ports.
An adversary sends TCP packets with the FIN flag but not associated with an existing connection to target ports.
Technique |
---|
An adversary uses the response from the target to determine the port's state. If no response is received the port is open. If a RST packet is received then the port is closed.
An adversary uses the response from the target to determine the port's state. If no response is received the port is open. If a RST packet is received then the port is closed.
Technique |
---|
Scope | Likelihood | Impact | Note |
---|---|---|---|
Confidentiality | N/A | Other | N/A |
ConfidentialityAccess ControlAuthorization | N/A | Bypass Protection MechanismHide Activities | N/A |
Taxonomy Name | Entry ID | Entry Name |
---|