CAPEC-299: TCP SYN Ping

Detailed Stable 严重程度: Low

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An adversary uses TCP SYN packets as a means towards host discovery. Typical RFC 793 behavior specifies that when a TCP port is open, a host must respond to an incoming SYN "synchronize" packet by completing stage two of the 'three-way handshake' - by sending an SYN/ACK in response. When a port is closed, RFC 793 behavior is to respond with a RST "reset" packet. This behavior can be used to 'ping' a target to see if it is alive by sending a TCP SYN packet to a port and then looking for a RST or an ACK packet in response.

前提条件

  • The ability to send a TCP SYN packet to a remote target. Depending upon the operating system, the ability to craft SYN packets may require elevated privileges.

所需技能

Low The adversary needs to know how to craft and send protocol commands from the command line or within a tool.

所需资源

  • SYN pings can be performed via the use of a port scanner or by raw socket manipulation using a scripting or programming language. Packet injection tools are also useful for this purpose. Depending upon the technique used it may also be necessary to sniff the network in order to see the response.

后果影响

影响范围: Confidentiality

技术影响: Other

影响范围: Confidentiality Access Control Authorization

技术影响: Bypass Protection Mechanism

关键信息

CAPEC ID: CAPEC-299

抽象级别: Detailed

状态: Stable

典型严重程度: Low

相关攻击模式
相关CWE弱点