Well ‘no benefits’ is a bit of a stretch.
Well ‘no benefits’ is a bit of a stretch.
That’s probably a majority of the point. Falsely report that some interesting ports are open and he’ll spend time on them and potentially trigger alerts or blocks.
Fake open ports aren’t something a normal user would bother with or understand, but with all the tools available in the nefarious side, it makes sense to have options that make their job harder if you’re willing to use them.
Maybe what you’re referring to is along the lines of a port being open but the software on the other side of it not sending acknowledging responses?
At a guess, you might tell the difference between some benign scan and an attempt to actually take advantage of the port, perhaps to use as a trigger to automatically ban an ip address? or a way to divert malicious resources to an easy looking target so they are less available in other areas?
The difference between someone scanning for open ports and someone attacking a port they find open seems significant enough to at least track and watch for patterns… Whether that’s useful for the majority of users or not is rarely why a feature is implemented.
Forgot the orange
I know it’s going to last a long time because the old lady said they used it everyday and it still looks practically new