Content deleted Content added
→Protection against and detecting fingerprinting: wikify a bit more |
m →Protection against and detecting fingerprinting: HTTP to HTTPS for SourceForge |
||
(46 intermediate revisions by 34 users not shown) | |||
Line 1:
{{Short description|Remote detection of the characteristics of a TCP/IP stack}}
[[Image:passive figure.png|thumbnail|right|200px|Passive OS Fingerprinting method and diagram.]]
'''TCP/IP stack fingerprinting''' is the
== TCP/IP Fingerprint Specifics ==
Certain parameters within the [[TCP protocol]] definition are left up to the implementation.
include the following:
* Initial [[Network packet|packet]] size (16 bits)
* Initial [[Time to live|TTL]] (8 bits)
* Window size (16 bits)
*[[Maximum segment size|Max segment size]] (16 bits)
* Window scaling value (8 bits)
* "don't fragment" flag (1 bit)
Line 17 ⟶ 18:
* "nop" flag (1 bit)
These values may be combined to form a 67-bit signature, or fingerprint, for the target machine.<ref>Chuvakin A. and Peikari, C: "Security Warrior.", page 229. O'Reilly Media Inc., 2004.</ref> Just inspecting the Initial TTL and window size fields is often enough to successfully identify an operating system, which eases the task of performing manual OS fingerprinting.<ref>{{cite web|url=http://www.netresec.com/?page=Blog&month=2011-11&post=Passive-OS-Fingerprinting |title=Passive OS Fingerprinting, NETRESEC Network Security Blog |publisher=Netresec.com |date=2011-11-05 |accessdate=2011-11-25}}</ref>
== Protection against and detecting fingerprinting ==
Protection against all types of TCP/IP fingerprinting is achieved through TCP/IP fingerprint obfuscators. Also known as fingerprint scrubbing, tools exist for [[MS Windows]]<ref>[http://www.irongeek.com/i.php?page=security/osfuscate-change-your-windows-os-tcp-ip-fingerprint-to-confuse-p0f-networkminer-ettercap-nmap-and-other-os-detection-tools OSfuscate]</ref>, [[Linux]]<ref>[http://ippersonality.sourceforge.net/ IPPersonality]</ref>, [[FreeBSD]]<ref>[http://www.usenix.org/events/sec00/full_papers/smart/smart_html/index.html Defeating TCP/IP stack fingerprinting]</ref>, and likely others.▼
▲
== Fingerprinting tools ==
A list of TCP/OS Fingerprinting Tools
* [[Zardaxt.py]]<ref>{{cite web|url=https://github.com/NikolaiT/zardaxt |title=Zardaxt.py |publisher=Github |date=2021-11-25 |accessdate=2021-11-25}}</ref> – Passive open-source TCP/IP Fingerprinting Tool.
* [[Ettercap (computing)|Ettercap]]
* [[
* [[
*
* [[PacketFence]]<ref>
* Satori
* SinFP
* XProbe2
* queso - well-known tool from the late 1990s which is no longer being updated for modern operating systems.
== External links ==▼
* [http://insecure.org/nmap/osdetect/ Remote OS detection via TCP/IP Stack FingerPrinting (2nd Generation)]▼
== References ==
{{reflist|1}}
▲== External links ==
▲* [http://insecure.org/nmap/osdetect/ Remote OS detection via TCP/IP Stack FingerPrinting (2nd Generation)]
[[Category:TCP/IP|Stack Fingerprinting]]▼
* [https://bilisim.ahmetcadirci.com/ Bilişim Kodları ve Kısaltmaları]
[[Category:Internet Protocol]]
[[Category:Fingerprinting algorithms]]
|