B4 OS fingerprinting Flashcards

1
Q

Active fingerprinting

A

sending packets to system and examining results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

passive fingerprinting

A

listen to the traffic, sniffing the packets.
Passive fingerprinting uses a network sniffer to stealthily capture network packets to avoid being detected
by intrusion detection systems or alerting the network administrators. It avoids detection by not sending
any network traffic to any of the targets, it simply sits on the network listening and collecting the traffic. If
you don’t make any noise, you cannot be heard.
The collected network packets are then analysed to learn more about the target, such as the version of
their operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

flag settings example for passive fingerprinting

A

These settings include flags such as Time To Live (TTL), Window size, Don’t fragment, Type of service and
so on. For example Windows 10 has an initial TTL of 128, Linux may have 64 or 255 depending on the
distribution and kernel, Cisco network devices use 255.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

p0f

A

mointors captures and examines traffic

sends no packets to targets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

network miner

A

windows tool, GUI, uses p0f as well as others. gathers a lot so may get too much (username passwords).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly