What operating system would respond to the command 'C:\> nmap -sW 10.10.145.65'?

Prepare for the Computer Hacking Forensic Investigator v11 exam. Study with flashcards and multiple choice questions. Each question includes hints and explanations. Get exam-ready efficiently!

Multiple Choice

What operating system would respond to the command 'C:\> nmap -sW 10.10.145.65'?

Explanation:
Window scan with Nmap relies on how a host’s TCP window size is handled in replies. The -sW option probes the target and uses the TCP window size to help decide whether ports are open or closed. This behavior depends on the target’s TCP/IP stack, and BSD-based stacks like FreeBSD expose the kind of TCP window behavior that Nmap uses for this probe. Older or different Windows TCP stacks (such as Windows 95/XP) don’t respond to these probes in the same reliable way, so they’re not the typical environment where this scan type yields the expected results. Among the given systems, FreeBSD is the classic example where the window-size probing works as intended, which is why it would respond to that command in a way aligned with Nmap’s -sW scan.

Window scan with Nmap relies on how a host’s TCP window size is handled in replies. The -sW option probes the target and uses the TCP window size to help decide whether ports are open or closed. This behavior depends on the target’s TCP/IP stack, and BSD-based stacks like FreeBSD expose the kind of TCP window behavior that Nmap uses for this probe. Older or different Windows TCP stacks (such as Windows 95/XP) don’t respond to these probes in the same reliable way, so they’re not the typical environment where this scan type yields the expected results. Among the given systems, FreeBSD is the classic example where the window-size probing works as intended, which is why it would respond to that command in a way aligned with Nmap’s -sW scan.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy