Nmap Announce mailing list archives

Re: Faking/Spoofing nmap's OS reply?


From: Massimo Fubini <mfubini () studenti ing uniroma1 it>
Date: Wed, 23 Aug 2000 15:43:55 +0200

lunedì 21 agosto 2000, elad wrote:
e> Then move to why you can't 'spoof' your
e> OS when scanned with nmap. After that maybe add a part about how you can
e> fake/spoof your OS anyway, but in an unefficient way.
About the OS spoofing, you can give a look to the article:
"Defeating TCP/IP Stack Fingerprinting"
Matthew Smart, G. Robert Malan, and Farnam Jahanian, University of Michigan 
Presented at the recent "9th USENIX Security Symposium".

You can find an abstract of the article at:
http://www.usenix.org/publications/library/proceedings/sec2000/smart.html
but to have all the article you must be a USENIX member.

 Massimo

Massimo Fubini
Universita' di Roma La Sapienza
E-Mail: M.Fubini () ieee org



--------------------------------------------------
For help using this (nmap-hackers) mailing list, send a blank email to 
nmap-hackers-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).


Current thread: