Help Irongeek.com pay for bandwidth and research equipment:
Xmas scan with Nmap (Hacking Illustrated Series InfoSec Tutorial Videos)
Xmas scan with Nmap
According to RFC 793, if a closed
port gets a TCP packet without the SYN, RST, or ACK flag being set, it is
suppose to respond with a RST packet. If the port is open, the TCP stack is
suppose to just drop the packet without giving a response. Not all Operating
Systems follow the RFC to the letter however, and these discrepancies allow for
OS fingerprinting. I've covered OS fingerprinting in other videos (which I will
link off to later), this video will just illustrates the point by showing off
Nmap's XMAS scan option which sets only the FIN, PSH, and URG flags and nothing
else. I'll also be using Zenmap, Ndiff and Wireshark to help you get the idea.