Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 08 Feb 2010 00:41:59 +0100
From:      Dominic Fandrey <kamikaze@bsdforen.de>
To:        yavuz <sakncli@gmail.com>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: Cheating OS fingerprinting
Message-ID:  <4B6F4FC7.5090705@bsdforen.de>
In-Reply-To: <97371e801002070554n7a76a85fnbcce0cea7127cdb9@mail.gmail.com>
References:  <97371e801002070554n7a76a85fnbcce0cea7127cdb9@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
yavuz wrote:
> Hi all,
> 
> I want to cheat os fingerprinting tools ( primary nmap) in my freebsd
> machine. Assume I am using freebsd 8 and I want to be seen as a windows xp
> machine when someone scans my ports.
> 
> ...
> I want to implement a freebsd tool that cheats os fingerprinting. As I said,
> I have to analyze all incomming packets as a firewall and do some job if
> packets are comming from a scanner. Can I implement this feature as a patch
> to PF, or does PF provides some mechanisms to write extension modules? Can
> you give any advices? Where is to start:)

Well, you can simply redirect all traffic to a port on localhost, where your
service is listening. However, said service needs to forward the regular
traffic to the assigned ports in order to not block your entire networking
capabilities.

-- 
A: Because it fouls the order in which people normally read text.
Q: Why is top-posting such a bad thing?
A: Top-posting.
Q: What is the most annoying thing on usenet and in e-mail? 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4B6F4FC7.5090705>