What is a FIN scan and how does it detect open ports

0 votes
A FIN scan sends packets with only the FIN flag set. How does this method identify open ports and avoid detection?
1 day ago in Cyber Security & Ethical Hacking by Anupam
• 16,140 points
16 views

1 answer to this question.

0 votes

A FIN scan is a stealthy technique used in network reconnaissance to identify open TCP ports on a target system. It operates by sending TCP packets with only the FIN (finish) flag set, without establishing a full TCP handshake. This method leverages nuances in the TCP protocol to infer the state of ports while minimizing detection.

How FIN Scans Work?

According to RFC 793, the behavior of a TCP port when receiving a packet with the FIN flag set varies based on its state:

  • Closed Port: Sends back a TCP RST (reset) packet, indicating that the port is closed.​

  • Open Port: Ignores the unsolicited FIN packet and does not respond.​

By analyzing the responses (or lack thereof), a scanner can determine which ports are open or closed.​

Advantages of FIN Scans

  • Stealthiness: FIN scans do not initiate a full TCP handshake, making them less conspicuous and harder to detect by intrusion detection systems (IDS) and firewalls.​

  • Firewall Evasion: Some firewalls and packet filters are configured to monitor for standard connection attempts (like SYN packets) and may overlook FIN packets, allowing the scan to bypass certain security measures.​

Limitations

  • Operating System Behavior: Not all operating systems adhere strictly to RFC 793. For instance, Windows systems often respond with a RST packet regardless of the port's state, rendering FIN scans ineffective against such targets.​

  • Modern Security Measures: Advanced firewalls and IDS have evolved to detect and block FIN scans by recognizing patterns associated with this technique.​

Practical Example

Using Nmap, a popular network scanning tool, a FIN scan can be executed with the following command:​

nmap -sF 192.168.1.1

This command sends FIN packets to the target IP address (192.168.1.1) to identify open ports based on the responses received.

answered 15 hours ago by CaLLmeDaDDY
• 28,780 points

Related Questions In Cyber Security & Ethical Hacking

0 votes
1 answer
0 votes
0 answers

What is banner grabbing, and how does it reveal OS details?

Banner grabbing collects information from service responses. ...READ MORE

Apr 8 in Cyber Security & Ethical Hacking by Anupam
• 16,140 points
32 views
0 votes
1 answer

What is firewalking, and how does it bypass firewalls?

Firewalking is a network reconnaissance technique that ...READ MORE

answered 15 hours ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 28,780 points
12 views
0 votes
1 answer

What is passive fingerprinting, and how does it work?

Passive OS fingerprinting is a technique used ...READ MORE

answered 15 hours ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 28,780 points
22 views
+1 vote
1 answer

How do you decrypt a ROT13 encryption on the terminal itself?

Yes, it's possible to decrypt a ROT13 ...READ MORE

answered Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 28,780 points
686 views
+1 vote
1 answer

How does the LIMIT clause in SQL queries lead to injection attacks?

The LIMIT clause in SQL can indeed ...READ MORE

answered Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 28,780 points
508 views
+1 vote
1 answer

Is it safe to use string concatenation for dynamic SQL queries in Python with psycopg2?

The use of string concatenation while building ...READ MORE

answered Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 28,780 points
349 views
+1 vote
1 answer
0 votes
0 answers

How does Nmap detect open ports on a network?

Nmap is a widely used tool for ...READ MORE

Feb 27 in Cyber Security & Ethical Hacking by Anupam
• 16,140 points
64 views
0 votes
1 answer

What is CVE, and how does it help in vulnerability tracking?

​Common Vulnerabilities and Exposures (CVE) is a ...READ MORE

answered 5 days ago in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 28,780 points
41 views
webinar REGISTER FOR FREE WEBINAR X
REGISTER NOW
webinar_success Thank you for registering Join Edureka Meetup community for 100+ Free Webinars each month JOIN MEETUP GROUP