Home page logo

basics logo Security Basics mailing list archives

Re: SMTP Malformed (SYN+RST)
From: Joerg Over Dexia <over () dexia de>
Date: Thu, 01 Apr 2004 09:06:19 +0200

Am 14:09 31.03.2004 -0000 teilte lisa.m.mcclain () saic com mir
folgendes mit:
->Has anyone seen a SYN+RSt with a TCP Header Length of 0
->Along with an ACK of 0 and an offset of 0. TCP header Flags
->value of 134. Can someone tell me what this means.

Could be nmap, for example. Or some generic packet assembler.

->Is this a scan?

Probably, Yes.

->Is this a scan?

Probably, Yes.

It could also be part of a DOS (rather unlikely, I believe you'd
have mentioned that) or more generally, an attempt to pass a
firewall, part of a covert channel or part of a knock sequence.
You don't really give enough information to narrow that down...
my first guess would be somebody scanning for open relays, with
that port.

Source port and direction of packet, frequency, relative packets,
ip addresses, all that would help to guess better.

hth, JO

Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off 
any course! All of our class sizes are guaranteed to be 10 students or less 
to facilitate one-on-one interaction with one of our expert instructors. 
Attend a course taught by an expert instructor with years of in-the-field 
pen testing experience in our state of the art hacking lab. Master the skills 
of an Ethical Hacker to better assess the security of your organization. 
Visit us at: 

  By Date           By Thread  

Current thread:
  • Re: SMTP Malformed (SYN+RST) Joerg Over Dexia (Apr 01)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]