TCP 'RST' Flag Checksum Probe |
Attack Pattern ID: 328 (Detailed Attack Pattern) | Typical Severity: Low | Status: Draft |
Summary
This OS fingerprinting probe performs a checksum on any ASCII data contained within the data portion or a RST packet. Some operating systems will report a human-readable text message in the payload of a 'RST' (reset) packet when specific types of connection errors occur. RFC 1122 allows text payloads within reset packets but not all operating systems or routers implement this functionality.
Target Attack Surface Description
Targeted OSI Layers: Transport Layer
Target Attack Surface Localities
Server-side
Target Attack Surface Types: Host
Target Functional Services
Target Functional Service 1: None | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Protocol 1: TCP | ||||||||||||
|
Nature | Type | ID | Name | Description | View(s) this relationship pertains to![]() |
---|---|---|---|---|---|
ChildOf | ![]() | 315 | TCP/IP Fingerprinting Probes | Mechanism of Attack (primary)1000 |
Stuart McClure, Joel Scambray and George Kurtz. "Hacking Exposed: Network Security Secrets & Solutions". 6th Edition. McGraw Hill, ISBN: 978-0-07-161374-3. 2009.
Defense Advanced Research Projects Agency (DARPA). "RFC793 - Transmission Control Protocol". 1981. <http://www.faqs.org/rfcs/rfc793.html>.
Gordon "Fyordor" Lyon. "Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning". 3rd "Zero Day" Edition, . Insecure.com LLC, ISBN:978-0-9799587-1-7. 2008.