OS Fingerprinting Flashcards

1
Q

Define passive OS Fingerprinting

A

Passive - also known as packet sniffing, where an attempt is made to identify the OS by listening to, or sniffing, the system packets.

Matches well known values in packets. E.g.
TTL
Windows size
Dont fragment (DF Flag on packet)

Avoid being detected

Not 100% accurate

Attackers use this technique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define TTL

A

Time To Live
In order to prevent infinite packet loops a packet is given a limit in its existence.
Done through maximum hops on the network layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Devine Active Os Fingerprinting.

A

Active - Also known as scanning, where specially crafted packets are sent to the target system and the response is noted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe p0f Fingerprinting tool

A

Linux command line based
Monitors, captures and examines traffic.
Does not send any packets to the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe NetworkMiner OS Fingerprinting tool

A

Passive Fingerprinting tool for windows .
Has GUI
Two versions open source and pro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly