Home page logo
/

basics logo Security Basics mailing list archives

Re: Re: Re: Faking OS fingerprinting in Windows
From: "Phil Cryer" <phil () cryer us>
Date: Thu, 16 Jun 2005 12:33:38 -0500

From: shaver () cfl rr com
To: security-basics () securityfocus com
Date: 16 Jun 2005 05:12:31 -0000
Subject: Re: Re: Faking OS fingerprinting in Windows

try the paper "Defeating TCP/IP Stack Fingerprinting" located at 
http://www.usenix.org/publications/library/proceedings/sec2000/full_papers/smart/smart_html/index.html

Using OpenBSD as a firewall helps me, by default, PF (packetfilter) blocks packets with IP options set. This can make 
the job more difficult for "OS fingerprinting" utilities like nmap.  I haven't tested this, so I'm unsure of how good 
of a job it does, but it's something.

P


"You teach best what you most need to learn." - Richard Bach


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault