How does IP protocol scanning work?
What will be an ideal response?
IP protocol scanning examines a target host for supported IP protocols. In this method, the scanner transmits IP packets to each protocol on the target host. If a protocol on the target host replies with an ICMP unreachable message to the scanner, then the target host does not use that protocol. If there is no reply, then the hacker assumes that the target host supports that protocol. Unfortunately for the hacker, firewalls and computers that run operating systems such as Digital UNIX (now replaced with Compaq Tru64 Operating System) and HP-UX do not send any ICMP unreachable messages. Consequently, the IP protocols supported by such hosts cannot be determined by using IP protocol scanning. Fortunately for the script kiddie population, the number of Digital UNIX,Tru64, and HP-UX servers is relatively small.
You might also like to view...
A logical error can be detected and repaired by the compiler
Indicate whether the statement is true or false
To find a synonym for a phrase, select the phrase, then right-click it to display the shortcut menu. Point to Synonyms, then click Thesaurus to open the _____ pane.
A. Research B. Synonyms C. Review D. Thesaurus