> --On 26 June 2005 15:27 +0200, [EMAIL PROTECTED] wrote:
>
>> Is there any spamtrap-like Mechanism for the pf?
>> E.g. more skilled "badguys" don't use `nmap -sS &target`.
>> Such guys will limit their scans to just a few ports (3-6).
>
> Since this type of scan typically won't complete a 3-way handshake,
> there's not really any chance to tell a spoofed source address from a
> real one...

What's about 3-Way- handshake scans?
As I said such guys scan just a few ports to not getting noticed by an IDs
(and a IDS would "mostly" notice Syn-Scans but not full 3-way. Scans if
just 3 ports e.g. where scanned).

e.g.
nmap -sT -sV -P0 -sV -p21,22,80 would be such a case
or
nmap -sT -sV -P0 -sV -p21,22

So if I know that I don't run a FTPd the Src-IP would get blocked and the
scan for other ports would fail.

Kind regards,
Sebastian

Reply via email to