We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hi Guys,
This site has been so helpful. I did notice the arrow for a closed port on the half-open scan is going from the attacker to the victim. But as the port is closed should it not be from the victim to the attacker. A Wireshark test confirmed it. OR I made a silly mistake and apologies for the interruption. Thanks Tim https://github.com/undergroundwires/CEH-in-bullet-points/blob/master/chapters/03-scanning-networks/scanning-techniques.md
The text was updated successfully, but these errors were encountered:
Correct SYN scan behavior with closed port #1
7d0e0e6
Thank you for your contribution @timv1964 , spot-on, it was just plain wrong. It's fixed now.
Sorry, something went wrong.
b34bf0d
Merge pull request undergroundwires#1 from oprypin/plug
2d5cf5e
Add plugins to resolve hacks that were needed for the MkDocs build
No branches or pull requests
Hi Guys,
This site has been so helpful. I did notice the arrow for a closed port on the half-open scan is going from the attacker to the victim. But as the port is closed should it not be from the victim to the attacker. A Wireshark test confirmed it.
OR
I made a silly mistake and apologies for the interruption.
Thanks
Tim
https://github.com/undergroundwires/CEH-in-bullet-points/blob/master/chapters/03-scanning-networks/scanning-techniques.md
The text was updated successfully, but these errors were encountered: