wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is OS Fingerprinting?

profile
Meet Chauhan
Aug 03, 2022
1 Like
0 Discussions
335 Reads

What is OS Fingerprinting?

 

All individual has their own unique fingerprints by which the individual is been identified. Similarly, to that every device/system has its own unique information by which they are identify.

 

OS Fingerprinting is a technique, which is used to identify the information of your target machine operating system. By this the attacker/hacker determines the vulnerabilities and possible bugs that targeted operating system may have. It allows the attacker/hacker to find the easiest way to gain the access of targeted system. It gathers information such as: Operating system version, device/hardware are attached to system, BIOS,

 

 

There are Two types of OS Fingerprinting:

 

1. Active OS Fingerprinting

2. Passive OS Fingerprinting

 

Active OS Fingerprinting:

 

Active Fingerprinting is most popular type of fingerprinting in use. It involves of sending packets to system and wait for the system responds to analyse. In simplest way we can say It interact with the targeted system either by social means such as calling or emailing, or technical means such as scanning This is easiest way to detect remote OS & network. Also, it is most risky as it can be easily detected by IDS (Intrusion Detection System) and packet filtering firewalls. The most used tool for active fingerprinting is Nmap.

 

Passive OS Fingerprinting:

 

Passive OS Fingerprinting examine the traffic on the network to determine the operating system.

 

The main difference between active and passive fingerprinting is that passive fingerprinting does not actively send packets to the targeted system. Instead, it acts as network scanner in the form of a sniffer, simply watching the traffic data on a network without performing network alteration. As soon as the attacker has sniffed sufficient information, it can be analysed to extract pattern that will be useful for detecting operating system.

 

Actvie vs Passive Os Fingerprinting

 

Tools used for OS Fingerprinting are:

 

Active OS Fingerprinting:

1. Nmap

2. RING

3. Xprobe

4. Xprobe2

 

Passive OS Fingerprinting:

1. p0f

2. Ettercap

3. Satori

4. NetworkMiner


Comments ()


Sign in

Read Next

Bulk E-mail software

Blog banner

indian premier league

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

Message Passing in OS

Blog banner

All you need to know about Website Traffic

Blog banner

Dekkers Algorithm : Ensuring Safe Process Synchronization

Blog banner

Health is Wealth

Blog banner

MAJOR ACHIEVEMENTS OF OS

Blog banner

SQL Injection Techniques

Blog banner

IP ADDRESS

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Deadlock

Blog banner

The Five Steps of Data Science

Blog banner

INTRODUCTION TO C#

Blog banner

My Favorite Sportsperson

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner

What is Segmentation?

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

Honeypot in cyber security

Blog banner

Data Mining

Blog banner

Understanding Mobile Device Forensics

Blog banner

Khau Galli – Vile Parle

Blog banner

EdTech (Education Technology)

Blog banner

Direct memory access (DMA)

Blog banner

Social media

Blog banner

How to tie a Tie

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

ADIDAS

Blog banner

JIRA SOFTWARE

Blog banner

SQL Injection

Blog banner

What is semaphore in operating system?

Blog banner

Malware

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

Revolutionary AI Tool: ChatGPT

Blog banner

What Function Does SEO Serve in Digital Marketing?

Blog banner

operating system

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Decision Tree: A Diagram Model

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

Real Time Scheduling

Blog banner