Home page logo
/

basics logo Security Basics mailing list archives

Re: Re: Faking OS fingerprinting in Windows
From: shaver () cfl rr com
Date: 16 Jun 2005 05:12:31 -0000

try the paper "Defeating TCP/IP Stack Fingerprinting" located at 
http://www.usenix.org/publications/library/proceedings/sec2000/full_papers/smart/smart_html/index.html

or 

"A practical approach for defeating Nmap OS-Fingerprinting" at 
http://voodoo.somoslopeor.com/papers/nmap.html


Basically, you would run a linux based router using a program (something like "fingerprint scrubber" or "fingerprint 
fucker" (sorry mods, that's the name) to sit out in front of whatever group of systems you want to protect from OS 
scanning.  Hope that helps you out although it sounds as though you're trying to figure out what someone has sitting in 
front of a corporate network and really trying to fingerprint a box behind it while it doesn't seem you have access to 
the security configuration of it.......not sure how much more help i'm going to lend to this one if you know where I 
think you're headed with this one...


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault