WIRESHARK
TCP FLAGS

PORT SCAN TYPES

TCP CONNECT SCANS
root@dco:~$ Wireshark
#step 1: get an overview
WireShark
Filter: tcp.flags.syn==1 and tcp.flags.ack==0 and tcp.window_size > 1024
#step 2: drill-down and isolate
WireShark
Filter: tcp.port==22
#step 3: reveals the IP address conducting the port scans



SYN SCANS
root@dco:~$ Wireshark
#step 1: get an overview
WireShark
Filter: tcp.flags.syn==1 and tcp.flags.ack==0 and tcp.window_size <= 1024
#step 2: drill-down and isolate
WireShark
Filter: tcp.port==22
#step 3: reveals the IP address conducting the port scans



UDP SCANS
root@dco:~$ Wireshark
#step 1: get an overview
WireShark
Filter: icmp.type==3 and icmp.code==3
#step 2: drill-down and isolate
WireShark
Filter: udp
* analysts might want to limit the filter to what is aligned in the organization's PPSM / asset inventory
#step 3: reveals the IP address conducting the port scans


Last updated