wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is OS Fingerprinting?

profile
Meet Chauhan
Aug 03, 2022
1 Like
0 Discussions
337 Reads

What is OS Fingerprinting?

 

All individual has their own unique fingerprints by which the individual is been identified. Similarly, to that every device/system has its own unique information by which they are identify.

 

OS Fingerprinting is a technique, which is used to identify the information of your target machine operating system. By this the attacker/hacker determines the vulnerabilities and possible bugs that targeted operating system may have. It allows the attacker/hacker to find the easiest way to gain the access of targeted system. It gathers information such as: Operating system version, device/hardware are attached to system, BIOS,

 

 

There are Two types of OS Fingerprinting:

 

1. Active OS Fingerprinting

2. Passive OS Fingerprinting

 

Active OS Fingerprinting:

 

Active Fingerprinting is most popular type of fingerprinting in use. It involves of sending packets to system and wait for the system responds to analyse. In simplest way we can say It interact with the targeted system either by social means such as calling or emailing, or technical means such as scanning This is easiest way to detect remote OS & network. Also, it is most risky as it can be easily detected by IDS (Intrusion Detection System) and packet filtering firewalls. The most used tool for active fingerprinting is Nmap.

 

Passive OS Fingerprinting:

 

Passive OS Fingerprinting examine the traffic on the network to determine the operating system.

 

The main difference between active and passive fingerprinting is that passive fingerprinting does not actively send packets to the targeted system. Instead, it acts as network scanner in the form of a sniffer, simply watching the traffic data on a network without performing network alteration. As soon as the attacker has sniffed sufficient information, it can be analysed to extract pattern that will be useful for detecting operating system.

 

Actvie vs Passive Os Fingerprinting

 

Tools used for OS Fingerprinting are:

 

Active OS Fingerprinting:

1. Nmap

2. RING

3. Xprobe

4. Xprobe2

 

Passive OS Fingerprinting:

1. p0f

2. Ettercap

3. Satori

4. NetworkMiner


Comments ()


Sign in

Read Next

The Role of Cyber Forensics in Addressing Cyber security Challenges in Smart Cities

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

10 Types of Friends in every friend group

Blog banner

Deadlock in Operating systems

Blog banner

Threads Concurrency: Mutual Exclusion and Synchronization

Blog banner

The Procedural Framework for Corporate High-Tech Investigations

Blog banner

On-Page SEO

Blog banner

The Impact of Cyber Forensics on Corporate Governance and Compliance

Blog banner

WORKFRONT SOFTWARE

Blog banner

objectives and function of operating system

Blog banner

CYBERPEACEKEEPING: NEW WAYS TO PREVENT AND MANAGE CYBERATTACKS

Blog banner

Memory input output management

Blog banner

Cache memory

Blog banner

Deadlock in Operating System

Blog banner

Booting Process In Operating System

Blog banner

The Right way of cooking

Blog banner

Cryptanalysis tool

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Short-Form Video Marketing: Why It's Dominating the Internet

Blog banner

Hubspot

Blog banner

5 Things I As A Dentist Would Never Do (And What You Can Learn From It)

Blog banner

Disk cache

Blog banner

IT service level agreement

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

5 Stages of Digital Marketing

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

Getting into anime My anime suggestions

Blog banner

Inventory management software system

Blog banner

Automating OSINT tasks for efficient Cyber Forensics Investigations

Blog banner

Microsoft Word

Blog banner

Proton mail

Blog banner

Social engineering in cyber security

Blog banner

File Organization and Access

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

Travel Geek ‘The last $50k in Switzerland’

Blog banner

Deadlock and Starvation

Blog banner

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

THE DESIRE OF MANY

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Threats To Computer System

Blog banner

DISK SCHEDULING

Blog banner

Answer

Blog banner