Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 07 Feb 2010 23:56:42 +0200
From:      Nikos Vassiliadis <nvass9573@gmx.com>
To:        yavuz <sakncli@gmail.com>,  "freebsd-questions@FreeBSD.org" <freebsd-questions@freebsd.org>
Subject:   Re: Cheating OS fingerprinting
Message-ID:  <4B6F371A.5070809@gmx.com>
In-Reply-To: <97371e801002070554n7a76a85fnbcce0cea7127cdb9@mail.gmail.com>
References:  <97371e801002070554n7a76a85fnbcce0cea7127cdb9@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On 2/7/2010 3:54 PM, yavuz wrote:
> Hi all,
>
> I want to cheat os fingerprinting tools ( primary nmap) in my freebsd
> machine. Assume I am using freebsd 8 and I want to be seen as a windows xp
> machine when someone scans my ports.
>
> In order to determine target host's OS, nmap sends seven TCP/IP crafted
> packets (called tests) and waits for the answer. Results are checked against
> a database of known results (OS signatures database). If the answer matches
> any of the entries in the database, it can guess that the remote OS is the
> same that the one in the database...
snip
> I want to implement a freebsd tool that cheats os fingerprinting.

If I recall correctly, honeyd does this and much more.
Check net/honeyd.

Nikos



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4B6F371A.5070809>