Previous Next
UDP Portscan
me@myhost:~$ nc -u -z -w1 10.0.0.20 19315

me@myhost:~$ xxd ks.dat

0000000: d4c3 b2a1 0200 0400 0000 0000 0000 0000  ................
0000010: ffff 0000 0100 0000 e149 f53d b763 0300  .........I.=.c..
0000020: 4200 0000 4200 0000 0000 f822 6058 0002  B...B......"`X..
0000030: b33e aeee 0800 4500 0034 6e80 4000 4011  .>....E..4n.@.@.
0000040: b823 0a00 0002 0a00 0014 820b 4b73 0020  .#..........Ks.
0000050: d9fb 0101 bef9 4b53 5000 1700 0000 0000  ......KSP.......
0000060: 0000 696e 666f 0003 01ef                 ..info....

me@myhost:~$ nc -u -w1 10.0.0.20 19315 < ks.dat

ksRomjmlfkbfajfghod
c),-	Keyserver*

me@myhost:~$ 



Netcat's UDP scan shows us nothing. This output indicates port 19315 is open, but it is the same if the server is down or if the firewall is closed.

Here is a hex dump of the outgoing packet we captured with Ethereal. We'll edit it to remove the packet headers, leving only the data.

Now when we send it through netcat, we get a quick reply from the server. Although mostly gibberish, it is enough to tell us the Keyserver program is running and we can connect across the network and firewalls.