Open In App

TCP Window Scan

TCP Window Scan is a new and exciting way to find out what is happening on your network from the outside. TCP Window Scan is performed by the administrators of a network, typically one that works for a large company, who are trying to determine if their network can be compromised in any way by hackers or other unethical individuals. Users of TCP window scan type in what IP address they want to be scanned and then other than that it goes around and checks every port on every machine it finds. When it finds a machine with a port open, it sends information about that port back to the person who initiated the scan. If a port is found in this way, that means there is some sort of program running on that computer. This is one way to find out if someone has used an FTP program or server to access files from your network. It can also be used to find out if someone has tried to get access to your network by using various exploits, like SMB or RDP. In the past hackers were able to gain access to networks through various exploits and by guessing username/password combinations. TCP window scans can determine if someone has used various exploits or other methods to guess valid usernames and passwords.

Function of TCP Window Scan:

Each packet that TCP Window Scan sends contains two headers. One header is called TCP Header (the one that gives the packet its TCP/IP look), and the other is called “TCP/UDP Data.” This information is sent back to the person who initiated the scan, so that they may debug the problem if one does occur.



Features:

 

TCP Window Scan on Nmap:

To view the TCP Window on the Nmap, open your terminal and then type in the following command:

 nmap -sW -T4 (Any TCP Stream you want to search)

For example:



 

Limitations:

Conclusion: 

TCP Window Scan is a useful tool for anyone who needs to know what ports are open, what kind of usernames and passwords are in use, and even who has connected to the network by using an FTP Server or some other program. As long as you are careful about what information you gather, this is a very effective way to find out if your company’s network can be compromised in any way.

Article Tags :