Define Nmap Ack scan
Scan utilizing the ack TCP flag
Nmap Ack Scan Mechanics
No response = filtered
RST response = non-filtered (open filtered)
Nmap Ack Scan Command
nmap -sA [ip/hostname]
Ack Scan Non-Filtered Results Determination
Not filtered by firewall, or
Not RFC compliant host with the 793 RFC
Variations
TTL
Windows based
Nmap TTL Scan Command
nmap –ttl [time] [ip/hostname]
Nmap Window Scan Command
nmap -sW [ip/hostname]
Explain Nmap Window Scan
Closed ports have window size of 0,
Open ports have size greater than 0,
No response likely filtered