{"id":33,"date":"2007-11-14T16:42:02","date_gmt":"2007-11-14T14:42:02","guid":{"rendered":"http:\/\/wordpress.enye-sec.org\/en\/?p=33"},"modified":"2012-06-15T16:42:13","modified_gmt":"2012-06-15T14:42:13","slug":"playing-with-sockets-port-scan","status":"publish","type":"post","link":"https:\/\/www.enye-sec.org\/en\/papers\/playing-with-sockets-port-scan\/","title":{"rendered":"Playing with sockets (port scan)"},"content":{"rendered":"<p><span style=\"color: #444444; font-family: Arial,Helvetica,sans-serif; font-size: small;\"><a href=\"mailto:pepelux[at]enye-sec.org\"><span style=\"color: #333333; font-family: sans-serif; font-size: small;\">Pepelux<\/span><\/a><span style=\"font-family: sans-serif;\"> has wrote a paper about port scanning at low level. It explains <em>anonymous<\/em> port scan, playing with net packet headers using raw sockets. It shows most used scan techniques (xmas, fin, etc.), through own raw sockets code and examples. It also explains a little about SO&#8217;s detection.<\/span><\/span><\/p>\n<p><span style=\"color: #333333; font-family: sans-serif; font-size: small;\"><a href=\"http:\/\/www.enye-sec.org\/en\/papers\/playing.with.sockets.%28port.scanning%29.txt\" target=\"_blank\"><span style=\"color: #333333; font-family: sans-serif; font-size: small;\">Download (English)<\/span><\/a><\/span><span style=\"color: #333333; font-family: sans-serif; font-size: small;\">  |  <a href=\"http:\/\/www.enye-sec.org\/textos\/jugando.con.los.sockets.%28port.scanning%29.txt\" target=\"_blank\"><span style=\"color: #333333; font-family: sans-serif; font-size: small;\">Descargar (Castellano)<\/span><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pepelux has wrote a paper about port scanning at low level. It explains anonymous port scan, playing with net packet headers using raw sockets. It shows most used scan techniques (xmas, fin, etc.), through own raw sockets code and examples. It also explains a little about SO&#8217;s detection. Download (English) | Descargar (Castellano)<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[11,12,19],"class_list":["post-33","post","type-post","status-publish","format-standard","hentry","category-papers","tag-paper","tag-pepelux","tag-port-scanning"],"_links":{"self":[{"href":"https:\/\/www.enye-sec.org\/en\/wp-json\/wp\/v2\/posts\/33"}],"collection":[{"href":"https:\/\/www.enye-sec.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enye-sec.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enye-sec.org\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enye-sec.org\/en\/wp-json\/wp\/v2\/comments?post=33"}],"version-history":[{"count":2,"href":"https:\/\/www.enye-sec.org\/en\/wp-json\/wp\/v2\/posts\/33\/revisions"}],"predecessor-version":[{"id":35,"href":"https:\/\/www.enye-sec.org\/en\/wp-json\/wp\/v2\/posts\/33\/revisions\/35"}],"wp:attachment":[{"href":"https:\/\/www.enye-sec.org\/en\/wp-json\/wp\/v2\/media?parent=33"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enye-sec.org\/en\/wp-json\/wp\/v2\/categories?post=33"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enye-sec.org\/en\/wp-json\/wp\/v2\/tags?post=33"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}