Home page logo
/

basics logo Security Basics mailing list archives

Re: Faking OS fingerprinting in Windows
From: Louis Lerman <lblerman () gmail com>
Date: Thu, 16 Jun 2005 08:56:21 -0400

At the last Defcon, Kathy Wang gave a talk on a tool she was
developing called Morph - basically a tool to fool OS fingerprinters.
Here is a link to the project home page and he talks are listed
there.....

http://www.synacklabs.net/projects/morph/

Don't think she ported it to Windows yet, but could be a possibility.....

On 6/15/05, velox () consultant com <velox () consultant com> wrote:
Thanks for all the information. Yes, there is a router/gateway which port forwaring or NATting packets to the 
webserver.

However, this device fingerprinted might not what is seems to be (i.e. KX-HGW200). I have made this assumption since 
the client webserver is hosted in an known large hosting company. I would assume that they wouldnt be using such SOHO 
type of DSL modem for their client which is hosting their full Internet presence. But then again I maybe wrong :-P

As such, I am looking for information of such features in any appliance/device or Windows platforms that manipulate 
IP headers behavior. I have also googled about this behavior and it seems this Panasonic appliance is also frequently 
used but more often in a SOHO environment.

TIA!

====================================
Certified Geek
Email: velox_at_consultant_dot_com


--
___________________________________________________________
Sign-up for Ads Free at Mail.com
http://promo.mail.com/adsfreejump.htm




  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]