No announcement yet.

Scanning Networks - OS Fingerprinting

  • Filter
  • Time
  • Show
Clear All
new posts

  • Scanning Networks - OS Fingerprinting

    Much like individual people, operating systems have unique fingerprints that help identify them. The hard part is knowing how and where to look for these unique details and determine what each means.

    There are two types of fingerprinting: Active and Passive...

    How it works
    Active fingerprinting uses specially crafted packets where passive fingerprinting uses sniffing techniques to capture packets coming form the target system.

    Actively sending probes to the target host and compare the responses to a database of known responses. Passively sniffing what ever responses available and analyzing the data for details of the OS used.

    Chance of detection
    Active OS fingerprinting has a high chance of detection because it introduces traffic into the network where passive OS fingerprinting has a low chance of detection because sniffing does not introduce traffic to the network.
    Tools like Nmap has a great capability to do automated OS fingerprinting using a build in database.
    Certified Security Geek