Security Basics mailing list archives
Re: Re: Faking OS fingerprinting in Windows
From: shaver () cfl rr com
Date: 16 Jun 2005 05:12:31 -0000
try the paper "Defeating TCP/IP Stack Fingerprinting" located at http://www.usenix.org/publications/library/proceedings/sec2000/full_papers/smart/smart_html/index.html or "A practical approach for defeating Nmap OS-Fingerprinting" at http://voodoo.somoslopeor.com/papers/nmap.html Basically, you would run a linux based router using a program (something like "fingerprint scrubber" or "fingerprint fucker" (sorry mods, that's the name) to sit out in front of whatever group of systems you want to protect from OS scanning. Hope that helps you out although it sounds as though you're trying to figure out what someone has sitting in front of a corporate network and really trying to fingerprint a box behind it while it doesn't seem you have access to the security configuration of it.......not sure how much more help i'm going to lend to this one if you know where I think you're headed with this one...
Current thread:
- Faking OS fingerprinting in Windows Christian Wendell Gueco (Jun 13)
- RE: Faking OS fingerprinting in Windows Burton Strauss (Jun 15)
- Re: Faking OS fingerprinting in Windows Information Services (Jun 15)
- <Possible follow-ups>
- Re: Faking OS fingerprinting in Windows merc4krugger_at_gmail_dot_com (Jun 14)
- Re: Faking OS fingerprinting in Windows shaver (Jun 15)
- RE: Faking OS fingerprinting in Windows Andrew Shore (Jun 15)
- Re: Faking OS fingerprinting in Windows velox (Jun 15)
- Re: Faking OS fingerprinting in Windows Louis Lerman (Jun 16)
- Re: Faking OS fingerprinting in Windows finattack (Jun 15)
- Re: Re: Faking OS fingerprinting in Windows shaver (Jun 16)
- Re: Re: Re: Faking OS fingerprinting in Windows Phil Cryer (Jun 16)
- RE: Faking OS fingerprinting in Windows Matt Stovall (Jun 17)