wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is OS Fingerprinting?

profile
Meet Chauhan
Aug 03, 2022
1 Like
0 Discussions
338 Reads

What is OS Fingerprinting?

 

All individual has their own unique fingerprints by which the individual is been identified. Similarly, to that every device/system has its own unique information by which they are identify.

 

OS Fingerprinting is a technique, which is used to identify the information of your target machine operating system. By this the attacker/hacker determines the vulnerabilities and possible bugs that targeted operating system may have. It allows the attacker/hacker to find the easiest way to gain the access of targeted system. It gathers information such as: Operating system version, device/hardware are attached to system, BIOS,

 

 

There are Two types of OS Fingerprinting:

 

1. Active OS Fingerprinting

2. Passive OS Fingerprinting

 

Active OS Fingerprinting:

 

Active Fingerprinting is most popular type of fingerprinting in use. It involves of sending packets to system and wait for the system responds to analyse. In simplest way we can say It interact with the targeted system either by social means such as calling or emailing, or technical means such as scanning This is easiest way to detect remote OS & network. Also, it is most risky as it can be easily detected by IDS (Intrusion Detection System) and packet filtering firewalls. The most used tool for active fingerprinting is Nmap.

 

Passive OS Fingerprinting:

 

Passive OS Fingerprinting examine the traffic on the network to determine the operating system.

 

The main difference between active and passive fingerprinting is that passive fingerprinting does not actively send packets to the targeted system. Instead, it acts as network scanner in the form of a sniffer, simply watching the traffic data on a network without performing network alteration. As soon as the attacker has sniffed sufficient information, it can be analysed to extract pattern that will be useful for detecting operating system.

 

Actvie vs Passive Os Fingerprinting

 

Tools used for OS Fingerprinting are:

 

Active OS Fingerprinting:

1. Nmap

2. RING

3. Xprobe

4. Xprobe2

 

Passive OS Fingerprinting:

1. p0f

2. Ettercap

3. Satori

4. NetworkMiner


Comments ()


Sign in

Read Next

virtual machines and virtualization

Blog banner

Microsoft Windows Overview

Blog banner

AI & Data Science in Healthcare – Predicting diseases, medical imaging analysis

Blog banner

Developments in Modern Operating Systems

Blog banner

K-means use cases

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

objectives and functions of operating system

Blog banner

File management

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

Intrusion Detection System

Blog banner

Linux

Blog banner

Dangers of Using Public WiFis

Blog banner

Big Data

Blog banner

Study of Backdoor and Trojan tools

Blog banner

CyberSecurity Color Wheel

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

PHISHING

Blog banner

Social media

Blog banner

note taker app

Blog banner

E-Cash (Electronic Cash)

Blog banner

Virtual Memory

Blog banner

Memory management and virtual memory

Blog banner

SMARTSHEET MANAGEMENT SOFTWARE

Blog banner

Deadlock and Starvation

Blog banner

Why we fail after giving 100% ?

Blog banner

The Future of Patola Weaving in a Sustainable Fashion World

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Mumbaicha Dabbawalla

Blog banner

Severe landslides continue to cause concern in Joshimath, Uttarakhand

Blog banner

The most common internet security threats

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

Fitness

Blog banner

american greatines

Blog banner

The Real Reason Patola Outfits Come at a Premium Cost

Blog banner

Theads

Blog banner

Deadlock in Operating systems

Blog banner

Cyber Forensic in the Banking sector

Blog banner

Royal enfield

Blog banner

Virtual Machine

Blog banner

QUANTUM COMPUTING IN SECURITY:A GAME CHANGER IN DIGITAL WORLD

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

Raid

Blog banner