B4 OS fingerprinting Flashcards
Active fingerprinting
sending packets to system and examining results
passive fingerprinting
listen to the traffic, sniffing the packets.
Passive fingerprinting uses a network sniffer to stealthily capture network packets to avoid being detected
by intrusion detection systems or alerting the network administrators. It avoids detection by not sending
any network traffic to any of the targets, it simply sits on the network listening and collecting the traffic. If
you don’t make any noise, you cannot be heard.
The collected network packets are then analysed to learn more about the target, such as the version of
their operating system.
flag settings example for passive fingerprinting
These settings include flags such as Time To Live (TTL), Window size, Don’t fragment, Type of service and
so on. For example Windows 10 has an initial TTL of 128, Linux may have 64 or 255 depending on the
distribution and kernel, Cisco network devices use 255.
p0f
mointors captures and examines traffic
sends no packets to targets
network miner
windows tool, GUI, uses p0f as well as others. gathers a lot so may get too much (username passwords).