wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is OS Fingerprinting?

profile
Meet Chauhan
Aug 03, 2022
1 Like
0 Discussions
338 Reads

What is OS Fingerprinting?

 

All individual has their own unique fingerprints by which the individual is been identified. Similarly, to that every device/system has its own unique information by which they are identify.

 

OS Fingerprinting is a technique, which is used to identify the information of your target machine operating system. By this the attacker/hacker determines the vulnerabilities and possible bugs that targeted operating system may have. It allows the attacker/hacker to find the easiest way to gain the access of targeted system. It gathers information such as: Operating system version, device/hardware are attached to system, BIOS,

 

 

There are Two types of OS Fingerprinting:

 

1. Active OS Fingerprinting

2. Passive OS Fingerprinting

 

Active OS Fingerprinting:

 

Active Fingerprinting is most popular type of fingerprinting in use. It involves of sending packets to system and wait for the system responds to analyse. In simplest way we can say It interact with the targeted system either by social means such as calling or emailing, or technical means such as scanning This is easiest way to detect remote OS & network. Also, it is most risky as it can be easily detected by IDS (Intrusion Detection System) and packet filtering firewalls. The most used tool for active fingerprinting is Nmap.

 

Passive OS Fingerprinting:

 

Passive OS Fingerprinting examine the traffic on the network to determine the operating system.

 

The main difference between active and passive fingerprinting is that passive fingerprinting does not actively send packets to the targeted system. Instead, it acts as network scanner in the form of a sniffer, simply watching the traffic data on a network without performing network alteration. As soon as the attacker has sniffed sufficient information, it can be analysed to extract pattern that will be useful for detecting operating system.

 

Actvie vs Passive Os Fingerprinting

 

Tools used for OS Fingerprinting are:

 

Active OS Fingerprinting:

1. Nmap

2. RING

3. Xprobe

4. Xprobe2

 

Passive OS Fingerprinting:

1. p0f

2. Ettercap

3. Satori

4. NetworkMiner


Comments ()


Sign in

Read Next

Linux Threads:

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

KAHAWA TEA

Blog banner

Is It Too Late to Straighten My Teeth as an Adult?

Blog banner

Memory management

Blog banner

The Khan mehtab transforming the modular switches

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner

Chicken Dum Biryani

Blog banner

Marvel Cinematic Universe

Blog banner

Blog on health and fitness

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

Best Time to Visit Arcadia, Florida & Why Oak Tree Hotel Is Always Ready

Blog banner

Amazon

Blog banner

15 Interesting Facts about India

Blog banner

Memory management

Blog banner

" THE ANSWERS THAT LED INDIAN BEAUTIES TO THE MISS UNIVERSE HISTORIC WIN. "

Blog banner

Hello World

Blog banner

File Management

Blog banner

objectives and functions of operating system

Blog banner

Cyber Security Control

Blog banner

Kernel in Operating System

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

Impact of social media on the human life

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

I/O Buffering

Blog banner

LIFEHACKER

Blog banner

Computer Security

Blog banner

Understanding Business Layer in Data Science

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

Memory management

Blog banner

operating system

Blog banner

Explain website hacking issues

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner

USPS mail

Blog banner

Constrained Management in IT

Blog banner

Operation system

Blog banner

The Future of Patola Weaving in a Sustainable Fashion World

Blog banner

Confidence Building Activities for the New School Year

Blog banner

I/O buffer and its techniques

Blog banner

Pink sauce pasta

Blog banner