官术网_书友最值得收藏!

Fingerprinting the operating system

Determining the operating system of a remote system is conducted using two types of scans:

  • Active fingerprinting: The attacker sends normal and malformed packets to the target and records its response pattern, referred to as the fingerprint. By comparing the fingerprint to a local database, the operating system can be determined.
  • Passive fingerprinting: The attacker sniffs, or records and analyzes, the packet stream to determine the characteristics of the packets.

Active fingerprinting is faster and more accurate than passive fingerprinting. In Kali, the two primary active tools are nmap and xprobe2.

The nmap tool injects packets into the target network and analyzes the response that it receives. In the following screenshot, the -O flag commands nmap to determine the operating system:

nmap -sS -O target.com

A related program, xprobe2, uses different TCP, UDP, and ICMP packets to bypass firewalls and avoid detection by IDS/IPS systems. Xprobe2 also uses fuzzy pattern matching – the operating system is not identified as definitely being one type; instead, it is assigned the probability of being one of several possible variants:

root@kali:~# xprobe2www.target.com  

Note that it is simple for the target system to hide the true operating system. Since fingerprinting software relies on packet setting, such as time-to-live or the initial windows size, changes to these values or other user-configurable settings can change the tool results. Some organizations actively change these values to make the final stages of reconnaissance more difficult.

主站蜘蛛池模板: 如皋市| 祁东县| 武城县| 光山县| 江川县| 中阳县| 田林县| 抚宁县| 安福县| 平泉县| 寿阳县| 新巴尔虎左旗| 景德镇市| 武陟县| 安徽省| 贵州省| 平凉市| 新河县| 泗水县| 涿州市| 日喀则市| 广元市| 富川| 乐安县| 错那县| 丹东市| 琼结县| 阿拉善左旗| 皮山县| 合川市| 莲花县| 兴海县| 谷城县| 湘西| 牙克石市| 夹江县| 扎囊县| 昌黎县| 瑞安市| 石屏县| 红桥区|