wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is OS Fingerprinting?

profile
Meet Chauhan
Aug 03, 2022
1 Like
0 Discussions
338 Reads

What is OS Fingerprinting?

 

All individual has their own unique fingerprints by which the individual is been identified. Similarly, to that every device/system has its own unique information by which they are identify.

 

OS Fingerprinting is a technique, which is used to identify the information of your target machine operating system. By this the attacker/hacker determines the vulnerabilities and possible bugs that targeted operating system may have. It allows the attacker/hacker to find the easiest way to gain the access of targeted system. It gathers information such as: Operating system version, device/hardware are attached to system, BIOS,

 

 

There are Two types of OS Fingerprinting:

 

1. Active OS Fingerprinting

2. Passive OS Fingerprinting

 

Active OS Fingerprinting:

 

Active Fingerprinting is most popular type of fingerprinting in use. It involves of sending packets to system and wait for the system responds to analyse. In simplest way we can say It interact with the targeted system either by social means such as calling or emailing, or technical means such as scanning This is easiest way to detect remote OS & network. Also, it is most risky as it can be easily detected by IDS (Intrusion Detection System) and packet filtering firewalls. The most used tool for active fingerprinting is Nmap.

 

Passive OS Fingerprinting:

 

Passive OS Fingerprinting examine the traffic on the network to determine the operating system.

 

The main difference between active and passive fingerprinting is that passive fingerprinting does not actively send packets to the targeted system. Instead, it acts as network scanner in the form of a sniffer, simply watching the traffic data on a network without performing network alteration. As soon as the attacker has sniffed sufficient information, it can be analysed to extract pattern that will be useful for detecting operating system.

 

Actvie vs Passive Os Fingerprinting

 

Tools used for OS Fingerprinting are:

 

Active OS Fingerprinting:

1. Nmap

2. RING

3. Xprobe

4. Xprobe2

 

Passive OS Fingerprinting:

1. p0f

2. Ettercap

3. Satori

4. NetworkMiner


Comments ()


Sign in

Read Next

KASHMIR TRIPS

Blog banner

Earth with no trees

Blog banner

The seven-step improvement process

Blog banner

Proof-of-Stake (PoS)

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Embedded Operating System

Blog banner

The Psychology of Diversity, Equity & Inclusion: How Inclusive Workplaces Boost Productivity

Blog banner

EFT

Blog banner

Development Of Modern Operating System

Blog banner

Not anti-social, but pro-solitude

Blog banner

The Real Reason Patola Outfits Come at a Premium Cost

Blog banner

Article on Fresh Book

Blog banner

Best Time to Visit Arcadia, Florida & Why Oak Tree Hotel Is Always Ready

Blog banner

File Sharing

Blog banner

NodeJs

Blog banner

E-mail security

Blog banner

PROCESS STATES OF OPERATING SYSTEM

Blog banner

security requirements for safe e-payment

Blog banner

MODERN OPERATING SYSTEM

Blog banner

LIMITED EDITION

Blog banner

File management

Blog banner

Deadlock

Blog banner

Define Instagram.

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

Raid

Blog banner

Multiprocessor and scheduling

Blog banner

The launch of UniMap by HERE

Blog banner

Memory Management

Blog banner

Respondo Launches Revolutionary Video Discussion App

Blog banner

PHONE TECHNOLOGY

Blog banner

OS Assignment 3

Blog banner

Financial Fraud Detection

Blog banner

What is Influencer Marketing and its Trends

Blog banner

Short-Form Video Marketing: Why It's Dominating the Internet

Blog banner

What is Virtual Memory

Blog banner

Why Users Leave Your Website in 5 Seconds (And How UI/UX Fixes It)

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

Memory heirchy

Blog banner

Concurrency management in operating systems

Blog banner

Deming’s Process

Blog banner

A-B-C of Networking: Part-2 (Components)

Blog banner