Definition

port scan

Contributor(s): Stephanie Ireland

A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services, each associated with a "well-known" port number, the computer provides. Port scanning, a favorite approach of computer cracker, gives the assailant an idea where to probe for weaknesses. Essentially, a port scan consists of sending a message to each port, one at a time. The kind of response received indicates whether the port is used and can therefore be probed for weakness.

Types of port scans include:

  • Vanilla - An attempt to connect to all ports (there are 65,536)
  • Strobe - An attempt to connect to only selected ports (typically, under 20)
  • Stealth scan - Several techniques for scanning that attempt to prevent the request for connection being logged
  • FTP Bounce Scan - Attempts that are directed through an File Transfer Protocol server to disguise the cracker's location
  • Fragmented Packets - Scans by sending packet fragments that can get through simple packet filters in a firewall
  • UDP - Scans for open User Datagram Protocol ports
  • Sweep - Scans the same port on a number of computers
This was last updated in April 2005

Continue Reading About port scan

Dig Deeper on Antivirus, antispyware management

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchSecurity

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

ComputerWeekly.com

  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...

Close