Re: OS Fingerprint

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Use IP personality tool for that.

http://ippersonality.sourceforge.net

regards,

U.SivaKumar,
Associate Consultant,
Networking & E-Security,
HCL Infosystems Limited.

"To handle yourself, use your head. To handle others, use your heart."

 
Antony Stone <Antony@xxxxxxxxxxxxxxxxxxxx>
Sent by: netfilter-admin@xxxxxxxxxxxxxxxxxxx
11/18/2003 10:57 AM GMT

To: netfilter@xxxxxxxxxxxxxxxxxxx
cc:
bcc:
Subject: Re: OS Fingerprint


On Tuesday 18 November 2003 10:05 am, Rodre Ghorashi-Zadeh wrote:

> Hello,
>
> Does anybody on this list have a rule that I can use to change the OS
> fingerprint of all packets leaving my DMZ? Thanks in advance.

This is not a simple thing to do, it involves mucking around with the way the
TCP/IP stack works inside the kernel, and as far as I know it can't be done
by a router disguising another machine; it needs to be done on the machine
itself which you are trying to disguise.

Try http://voodoo.somoslopeor.com/papers/nmap.html#LSOLUTIONS for some
possible ways to achieve it.

Antony.

--

Documentation is like sex:
when it's good, it's very very good;
when it's bad, it's still better than nothing.

                                                    Please reply to the list;
                                                          please don't CC me.


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux