RE: OS Fingerprint

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Vlado Had wrote:
> hi, could somebody help me, how can i change
> osfingerprint in packets?
> thanks

Do some homework. Basically a scanner uses inherent flaws in a packet
response to determine the destination machine, but it could also use the
fingerprint of the services running on the PC. Ex. if I implement 100%
faking on the networking part of my stealthing, but leave apache open,
the apache could say Redhat Linux blahblahblah and give it all away to
the hacker. It isn't just 'change TOS to random', or MSS to y, or block
all n packets to port q. Those are some OS fingerprint examples, but the
technique is a lot more detailed. If in doubt, tear open the nmap code!



[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux