TCP/IP stack fingerprinting: Difference between revisions

Content deleted Content added
Reverted edits by User:132.165.168.252 to last revision by User:213.162.13.18
No edit summary
Line 2:
 
There are two different types, active and passive. Passive OS fingerprinting identifies the remote operating system with packets that are received, without sending any packets. Active OS fingerprinting, by contrast, sends packets and waits for a response (or lack of one). Active OS fingerprinting sometimes sends strange packets, because different implementations respond differently to such errors.
 
[[p0f]] is the most famous passive OS fingerprinting tool.
 
[[Nmap]] is a common tool that performs TCP/IP stack fingerprinting.