Penetration Testing mailing list archives

Re: Methods for evading Nmap OS Fingerprinting


From: Cedric Blancher <blancher () cartel-securite fr>
Date: 11 Mar 2003 18:03:15 +0100

Le dim 09/03/2003 a 13:17, David Barroso a ecrit :
Hello,
I've just released a brief paper about methods for defeating Nmap when
guessing the remote OS. Since most pen-testers run Nmap for OS discover,
they should know which apps are out there for fooling Nmap and how they
work.
http://voodoo.somoslopeor.com/papers.php

You can also have a look to :

        http://ippersonality.sourceforge.net/

Which allows one to fool Nmap using Netfilter.

-- 
Cédric Blancher  <blancher () cartel-securite fr>
IT systems and networks security expert  - Cartel Sécurité
Phone : +33 (0)1 44 06 97 87 - Fax: +33 (0)1 44 06 97 99
PGP KeyID:157E98EE  FingerPrint:FA62226DA9E72FA8AECAA240008B480E157E98EE


----------------------------------------------------------------------------

Are your vulnerability scans producing just another report?
Manage the entire remediation process with StillSecure VAM's
Vulnerability Repair Workflow.
Download a free 15-day trial:
http://www2.stillsecure.com/download/sf_vuln_list.html


Current thread: