Nmap Development mailing list archives
Re: SinFP 2.06, new signatures, benchmark results
From: GomoR <nmap-hackers () gomor org>
Date: Fri, 22 Dec 2006 00:34:20 +0100
On Thu, Dec 21, 2006 at 02:48:23PM -0800, doug () hcsw org wrote: [..]
When you execute a version scan (-sV or -A) Nmap will also fingerprint *services* at the *application layer* which, it turns out, is often a fairly robust, reliable OS fingerprinting method. I rarely ever use -O
[..] I conquer. OS fingerprinting by TCP/IP stack analysis is just ... a fun thing to work on :) -- ^ ___ ___ http://www.GomoR.org/ <-+ | / __ |__/ Systems & Security Engineer | | \__/ | \ ---[ zsh$ alias psed='perl -pe ' ]--- | +--> Net::Frame <=> http://search.cpan.org/~gomor/ <---+ _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://SecLists.Org
Current thread:
- SinFP 2.06, new signatures, benchmark results GomoR (Dec 21)
- Re: SinFP 2.06, new signatures, benchmark results Fyodor (Dec 21)
- Re: SinFP 2.06, new signatures, benchmark results doug (Dec 21)
- Re: SinFP 2.06, new signatures, benchmark results DePriest, Jason R. (Dec 21)
- Re: SinFP 2.06, new signatures, benchmark results GomoR (Dec 21)
- Re: SinFP 2.06, new signatures, benchmark results GomoR (Dec 21)
- Re: SinFP 2.06, new signatures, benchmark results doug (Dec 21)
- Re: SinFP 2.06, new signatures, benchmark results Fyodor (Dec 21)