undergroundwires / CEH-in-bullet-points

💻 Certified ethical hacker summary in bullet points
https://cloudarchitecture.io/hacking
Creative Commons Attribution 4.0 International
995 stars 287 forks source link

RST by Receiver not Sender #1

Closed timv1964 closed 3 years ago

timv1964 commented 3 years ago

Hi Guys,

This site has been so helpful. I did notice the arrow for a closed port on the half-open scan is going from the attacker to the victim. But as the port is closed should it not be from the victim to the attacker. A Wireshark test confirmed it.
OR I made a silly mistake and apologies for the interruption. Thanks Tim https://github.com/undergroundwires/CEH-in-bullet-points/blob/master/chapters/03-scanning-networks/scanning-techniques.md

undergroundwires commented 3 years ago

Thank you for your contribution @timv1964 , spot-on, it was just plain wrong. It's fixed now.