OS Fingerprinting Flashcards
Define passive OS Fingerprinting
Passive - also known as packet sniffing, where an attempt is made to identify the OS by listening to, or sniffing, the system packets.
Matches well known values in packets. E.g.
TTL
Windows size
Dont fragment (DF Flag on packet)
Avoid being detected
Not 100% accurate
Attackers use this technique
Define TTL
Time To Live
In order to prevent infinite packet loops a packet is given a limit in its existence.
Done through maximum hops on the network layer.
Devine Active Os Fingerprinting.
Active - Also known as scanning, where specially crafted packets are sent to the target system and the response is noted.
Describe p0f Fingerprinting tool
Linux command line based
Monitors, captures and examines traffic.
Does not send any packets to the target.
Describe NetworkMiner OS Fingerprinting tool
Passive Fingerprinting tool for windows .
Has GUI
Two versions open source and pro