AVOIDING OS FINGERPRINTING IN WINDOWS

author
0 minutes, 45 seconds Read

[Irongeek] has been working on altering the OS fingerprint of his Windows box. typical network tools like Nmap, P0f, Ettercap, as well as NetworkMiner can identify what operating system is being run by the habits of the TCP/IP stack. By altering this behavior, you can make your system appear to be one more OS. [Irongeek] started composing his own tool by inspecting the source of safety and security Cloak to discover out what registry secrets needed to be changed. His OSfuscate tool lets you define your own .os fingerprint file. You can pretend to be any type of number of different systems from IRIX to Dreamcast. sadly this only works for TCP/IP. other methods, like Satori‘s DHCP based fingerprinting, still work as well as requirement to be bypassed by other means. Yes, this is just “security with obscurity”, however it is something fun to play with.

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *