TCP/IP stack fingerprinting

This is an old revision of this page, as edited by Biot (talk | contribs) at 13:08, 17 May 2005 (better category). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

TCP/IP stack fingerprinting (or OS fingerprinting) is the process in computing of determining the identity of a remote host's operating system by analyzing packets from that host.

There are two different types, active and passive. Passive OS fingerprinting identifies the remote operating system with packets that are received, without sending any packets. Active OS fingerprinting, by contrast, sends packets (sometimes odd packets) and waits for a response (or lack of one).