TCP/IP stack fingerprinting

This is an old revision of this page, as edited by Enk~enwiki (talk | contribs) at 07:00, 17 October 2006 (fixed internal link). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

TCP/IP stack fingerprinting (or OS fingerprinting) is the process in computing of determining the identity of a remote host's operating system by analyzing packets from that host.

There are two different types, active and passive. Passive OS fingerprinting identifies the remote operating system with packets that are received, without sending any packets. Active OS fingerprinting, by contrast, sends packets and waits for a response (or lack of one). Active OS fingerprinting sometimes sends strange packets, because different implementations respond differently to such errors.

Nmap is a tool that performs active TCP/IP stack fingerprinting.

p0f and Ettercap are tools that performs passive TCP/IP stack fingerprinting.