This post may contain affiliate links, please read our affiliate disclosure to learn more.
TCP Half Open Scan

TCP Half Open Scan

Author
 By Charles Joseph | Cybersecurity Researcher
Clock
 Published on December 15th, 2023
This post was updated on December 16th, 2023

A TCP Half Open Scan is a type of network probing technique. It starts by sending a SYN message to the target host. If the host responds with a SYN-ACK message, it indicates that the port is open. However, instead of replying with an ACK message to complete the three-way handshake (which typically initiates a true TCP connection), the scanner sends an RST (reset) message.

This way, the scan can glean information about which ports are open on the host without fully opening a TCP connection. As such, it is sometimes considered more stealthy as it may not be logged or noticed by less sophisticated intrusion detection systems.

Stay One Step Ahead of Cyber Threats

Want to Be the Smartest Guy in the Room? Get the Latest Cybersecurity News and Insights.
We respect your privacy and you can unsubscribe anytime.

TCP Half Open Scan Examples

#1. Example

In a scenario where a network administrator wants to assess their system’s security, conducting a TCP Half Open Scan can be incredibly insightful. This method helps in identifying open ports on their network, without necessarily alerting any intrusion detection systems.

The administrator initiates the process by sending a SYN – short for synchronize – message to one of their network’s ports. This is the first part of the TCP three-way handshake, a process designed to create a reliable connection between two networked devices.

If the port the administrator targeted is open, it will automatically respond with a SYN-ACK (synchronize-acknowledge) message. This response tells the administrator that the port is available for connections.

However, instead of proceeding with the expected ACK message, which would complete the handshake and formally open a TCP connection, the administrator sends a RST (reset) message. This abruptly terminates the initial connection process. Through this innovative tactic, the administrator is able to determine the open ports in the network without fully opening a TCP connection. This approach is more stealthy and goes unnoticed by less advanced intrusion detection systems.

#2. Example

An ethical hacker tasked with testing a network for vulnerabilities can employ a TCP Half Open Scan as part of their approach. This tool allows them to recognize open ports on the network, which can serve as entries for potential threats, without completely initiating a TCP connection.

The ethical hacker begins the scan by sending a SYN message. This message, short for synchronize, is the first step in creating a connection in TCP protocol. It is directed towards a specific port or range of ports on the network.

If a port on the network is open, it will reply to the SYN message with a SYN-ACK message, indicating the port is available for connections. The returning SYN-ACK signals to the ethical hacker that the port is not only open but potentially unsecured.

In a typical TCP three-way handshake, the next step would be for the sender to reply with an ACK or acknowledge message confirming a full connection. Yet, in this case, the ethical hacker ends the interaction with a RST, or reset, message. This action effectively halts the handshake, keeping the connection from completing. By implementing a TCP Half Open Scan, the ethical hacker can identify which ports on the network are open, without leaving a significant trace or alarming intrusion detection systems.

#3. Example

Consider a situation where security software is tasked to perform a routine evaluation of the network system it protects. One method it may utilize to fulfill this task is the TCP Half Open Scan. This scan is valuable in that it identifies open ports without executing a full TCP connection, thereby giving the software a low-profile yet effective approach to monitoring network security.

The security software initiates this process by sending out SYN messages, the initial step in the standard TCP three-way handshake. This query is aimed at various ports on the network, probing for responses that can indicate whether the ports are open or closed.

An open port, upon receipt of the SYN message, will reply with a SYN-ACK message, indicating its readiness to establish a connection. This automated reply gives the security software the information it needs—the port is indeed open, active, and potentially susceptible to intrusion.

In a regular connection establishment process, the software would then send an ACK message to complete the connection to the port. However, in this scenario, the software will instead send a RST or reset message. This action terminates the incipient connection before it fully forms, thereby enabling the software to identify the open ports on the network without causing the port to fully open a TCP connection. Such a tactic, though unusual, provides a stealthy way of assessing security without any substantial network disturbance.

Conclusion

Thus, a TCP Half Open Scan is an efficient and stealthy method for identifying open ports on a network without creating a full TCP connection. By sending a SYN message and looking for a SYN-ACK response, then interrupting the standard TCP handshake with an RST, administrators, ethical hackers, and security software can safely probe network systems for vulnerabilities.

Key Takeaways

  • A TCP Half Open Scan is a technique used to probe a network for open ports stealthily without creating a full TCP connection.
  • The process involves sending a SYN message to a target host. If the host returns a SYN-ACK message, it’s an indication that the port is open.
  • Instead of replying with an ACK message to complete the three-way handshake and open a connection, an RST message is sent, aborting the process and leaving the port status practically unchanged.
  • This method can be used by network administrators for security checks, ethical hackers for vulnerability testing, and security software for routine network evaluations.
  • TCP Half Open Scan can remain unnoticed by less advanced intrusion detection systems, lending it its stealthy nature.

Related Questions

1. What is a SYN message in the TCP Half Open Scan process?

A SYN message, short for synchronize, is the first step in the TCP three-way handshake. It’s sent to a port on a network to probe whether the port is open or closed.

2. How does a TCP Half Open Scan avoid a complete TCP connection?

A TCP Half Open Scan avoids a full TCP connection by responding to the SYN-ACK message, which signifies an open port with an RST or reset message instead of the usual ACK or acknowledge message. This abruptly halts the connection process.

3. Why is the TCP Half Open Scan considered stealthy?

The TCP Half Open Scan is perceived as stealthy because it doesn’t complete a TCP connection and hence, doesn’t leave significant traces behind. Less advanced intrusion detection systems may not always detect this scan.

4. Can a TCP Half Open Scan detect closed ports?

Yes. If a SYN message is sent to a closed port, the port will reply with an RST message, which signifies that the port is closed and not open for new connections.

5. What professions might use a TCP Half Open Scan?

A TCP Half Open Scan might be used by network administrators for routine security checks, ethical hackers testing for vulnerabilities, and security software conducting automated network evaluations.

QUOTE:
"Amateurs hack systems, professionals hack people."
-- Bruce Schneier, a renown computer security professional
Scroll to Top