Penetration Testing mailing list archives
Re: Methods for evading Nmap OS Fingerprinting
From: Cedric Blancher <blancher () cartel-securite fr>
Date: 11 Mar 2003 18:03:15 +0100
Le dim 09/03/2003 a 13:17, David Barroso a ecrit :
Hello, I've just released a brief paper about methods for defeating Nmap when guessing the remote OS. Since most pen-testers run Nmap for OS discover, they should know which apps are out there for fooling Nmap and how they work. http://voodoo.somoslopeor.com/papers.php
You can also have a look to : http://ippersonality.sourceforge.net/ Which allows one to fool Nmap using Netfilter. -- Cédric Blancher <blancher () cartel-securite fr> IT systems and networks security expert - Cartel Sécurité Phone : +33 (0)1 44 06 97 87 - Fax: +33 (0)1 44 06 97 99 PGP KeyID:157E98EE FingerPrint:FA62226DA9E72FA8AECAA240008B480E157E98EE ---------------------------------------------------------------------------- Are your vulnerability scans producing just another report? Manage the entire remediation process with StillSecure VAM's Vulnerability Repair Workflow. Download a free 15-day trial: http://www2.stillsecure.com/download/sf_vuln_list.html
Current thread:
- Methods for evading Nmap OS Fingerprinting David Barroso (Mar 09)
- Re: Methods for evading Nmap OS Fingerprinting Alex Lambert (Mar 11)
- Re: Methods for evading Nmap OS Fingerprinting Jason Dixon (Mar 11)
- Re: Methods for evading Nmap OS Fingerprinting Cedric Blancher (Mar 11)
- Re: Methods for evading Nmap OS Fingerprinting Alex Lambert (Mar 11)