Christmas tree packet

(Redirected from Xmas Port Scan)

In information technology, a Christmas tree packet (also known as a kamikaze packet, nastygram, or lamp test segment) is a network message segment or packet with every option enabled for the particular network protocol in use.

Background

edit

Network packets contain a number of flags or options depending on the type of network protocol in use. Enabling options can elicit specific behaviors in the device receiving the packet and differences in the responses to the packets. By analyzing those differences, Christmas tree packets can be used as a method of TCP/IP stack fingerprinting, exposing the underlying nature of a TCP/IP stack by sending the packets and then awaiting and analyzing the responses. When used as part of scanning a system, the TCP header of a Christmas tree packet has the flags FIN, URG and PSH set.[1] Many operating systems implement their compliance with the Internet Protocol standards[2][3] in varying or incomplete ways. By observing how a host responds to an odd packet, such as a Christmas tree packet, inferences can be made regarding the host's operating system. Versions of Microsoft Windows, BSD/OS, HP-UX, Cisco IOS, MVS, and IRIX display behaviors that differ from the RFC standard when queried with said packets.[4]

A large number of Christmas tree packets can also be used to conduct a DoS attack[5] by exploiting the fact that Christmas tree packets require much more processing by routers and end-hosts than the "usual" packets do.

Christmas tree packets can be easily detected by intrusion-detection systems or more advanced firewalls. From a network security point of view, Christmas tree packets are always suspicious and indicate a high probability of network reconnaissance activities.

See also

edit

References

edit
  1. ^ Gu, Z. Network Simulation and Evaluation. ISBN 978-981--974522-7. Retrieved 2024-08-30.
  2. ^ J. Postel, ed. (September 1981). INTERNET PROTOCOL - DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION. IETF. doi:10.17487/RFC0791. STD 5. RFC 791. IEN 128, 123, 111, 80, 54, 44, 41, 28, 26. Internet Standard 5. Obsoletes RFC 760. Updated by RFC 1349, 2474 and 6864.
  3. ^ S. Deering; R. Hinden (July 2017). Internet Protocol, Version 6 (IPv6) Specification. IETF. doi:10.17487/RFC8200. STD 86. RFC 8200. Internet Standard 86. Obsoletes RFC 2460.
  4. ^ "Port Scanning Techniques". nmap.org.
  5. ^ Kambourakis, G.; Anagnostopoulos, M.; Meng, W.; Zhou, P. (2019). Botnets: Architectures, Countermeasures, and Challenges. Series in Security, Privacy and Trust. CRC Press. ISBN 978-1-000-63997-1. Retrieved 2024-08-30.
edit