What can be deduced when a tester enters the nmap -sF command to perform a TCP FIN scan and the target host port does not respond?
- that the port is open
- that the port is not responding to TCP traffic
- that the port is listening for UDP traffic
- that the port is not ready to close the TCP connection
Explanation & Hint: If nothing is received from the target port in response to a TCP FIN scan, the port can be considered open because the normal behavior is to ignore the FIN packet. If the port is closed, the target system sends back an RST packet.
|