mailing list archives
The TCP Flags Playground
From: ofir () PACKET-TECHNOLOGIES COM (Ofir Arkin)
Date: Mon, 27 Mar 2000 08:29:32 +0200
Ok, once and for all I want to list what certain TCP Flags combination do:
Any combination of the ACK bit, except with a RST, would elicit a RST back
from a probed machines whether we
probe an opened port or a closed one.
SYN+FIN+URG would elicit a RST|ACK back whether we probe an opened port or a
SYN, SYN+FIN, SYN+PUSH, SYN+URG, SYN+FIN+PUSH, SYN+URG+PUSH,
FIN+URG+PUSH+SYN, all will elicit a RST|ACK from a closed port and a SYN|ACK
from an opened port.
FIN, FIN+URG+PUSH, URG, URG+PUSH, URG+FIN, PUSH, PUSH+FIN and NULL Flags
would all elicit a
RST|ACK on a closed port, *NIX machines will not respond when probed for an
opened port, Windows machines
still reply with RST|ACK.
Filtering Device Present:
If we use one of the Host Detection Combinations and we do not get a reply -
a filtering device is present and
prevent the probe from going inside the protected "zone" or the reply from
The Filtering Device is lame:
if the firewall is just a simple packet filter that blocks incoming SYN's
than some of the combinations I have listed
would elicit a reply. If the Firewall is statefull (AND do his job as it
should. I have seen some idiotically cases were
statefull was not implemented as it should.) nothing should pass it.
Hope this clarifies some questions I have seen people asked on various
Ofir Arkin <ofir () packet-technologies com>
Security QA Manager http://www.packet-technologies.com
The opinions in this message are my own, and not in any
way representative of Packet Technologies.
- The TCP Flags Playground Ofir Arkin (Mar 27)