Nmap Announce mailing list archives
Re: Faking/Spoofing nmap's OS reply?
From: Massimo Fubini <mfubini () studenti ing uniroma1 it>
Date: Wed, 23 Aug 2000 15:43:55 +0200
lunedì 21 agosto 2000, elad wrote: e> Then move to why you can't 'spoof' your e> OS when scanned with nmap. After that maybe add a part about how you can e> fake/spoof your OS anyway, but in an unefficient way. About the OS spoofing, you can give a look to the article: "Defeating TCP/IP Stack Fingerprinting" Matthew Smart, G. Robert Malan, and Farnam Jahanian, University of Michigan Presented at the recent "9th USENIX Security Symposium". You can find an abstract of the article at: http://www.usenix.org/publications/library/proceedings/sec2000/smart.html but to have all the article you must be a USENIX member. Massimo Massimo Fubini Universita' di Roma La Sapienza E-Mail: M.Fubini () ieee org -------------------------------------------------- For help using this (nmap-hackers) mailing list, send a blank email to nmap-hackers-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).
Current thread:
- Faking/Spoofing nmap's OS reply? elad (Aug 21)
- Re: Faking/Spoofing nmap's OS reply? Massimo Fubini (Aug 23)