FINDING · DETECTION

An attacker can conduct stealth port scans against a victim without revealing their own IP by exploiting a 'patsy' host whose OS uses a globally incrementing IP Identifier: the attacker observes ID increments of 2 (rather than 1) in the patsy's traffic when the victim sends a RST to the patsy in response to a spoofed SYN, revealing open ports. Choosing a different patsy for each port makes the scan very hard to detect.

From 2001-handley-networkNetwork Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics · §5.1 · 2001 · USENIX Security Symposium

Implications

Tags

censors
generic
techniques
dpitraffic-shape

Extracted by claude-sonnet-4-6 — review before relying.