A FIN scan sends TCP segments with the FIN flag set in an attempt to provoke a response (a TCP segment with the RST flag set) and thereby discover an active host or an active port on a host. The use of TCP segments with the FIN flag set might evade detection and thereby help the attacker succeed in his or her reconnaissance efforts.
Before You Begin |
---|
For background information, read Understanding Attacker Evasion Techniques. |
To thwart FIN scans, use the JUNOS CLI configuration editor to take either or both of the following actions.
- user@host# set security screen fin-no-ack tcp fin-no-ack
- user@host# set security zones security-zone name screen
fin-no-ack
where name is the name of the zone to which you want to apply this SCREEN option
![]() |
Note: Changing the packet flow to check that the SYN flag is set for packets that do not belong to existing sessions also thwarts other types of non-SYN scans, such as a null scan (when no TCP flags are set). |