[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Access on Port 0



While using nmap for fingerprinting my linux box, i noticed that it sends FP
flags for doing that. Is it really possible to fingerprint using corrupted
packets?

Do you have some docs on that?

Statu Nascendi.

----- Original Message -----
From: "Alain Tesio" <alain@onesite.org>
To: <debian-security@lists.debian.org>
Sent: Saturday, October 12, 2002 11:31 AM
Subject: Re: Access on Port 0


Packets on port 0 are invalid and like packets with private IPs or bad TCP
flags,
they can be used for fingerprinting the target system.
I don't see any other reason to see a packet on port 0.

Alain


--
To UNSUBSCRIBE, email to debian-security-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact
listmaster@lists.debian.org





Reply to: