Date: Sun, 07 Feb 2010 23:56:42 +0200 From: Nikos Vassiliadis <nvass9573@gmx.com> To: yavuz <sakncli@gmail.com>, "freebsd-questions@FreeBSD.org" <freebsd-questions@freebsd.org> Subject: Re: Cheating OS fingerprinting Message-ID: <4B6F371A.5070809@gmx.com> In-Reply-To: <97371e801002070554n7a76a85fnbcce0cea7127cdb9@mail.gmail.com> References: <97371e801002070554n7a76a85fnbcce0cea7127cdb9@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On 2/7/2010 3:54 PM, yavuz wrote: > Hi all, > > I want to cheat os fingerprinting tools ( primary nmap) in my freebsd > machine. Assume I am using freebsd 8 and I want to be seen as a windows xp > machine when someone scans my ports. > > In order to determine target host's OS, nmap sends seven TCP/IP crafted > packets (called tests) and waits for the answer. Results are checked against > a database of known results (OS signatures database). If the answer matches > any of the entries in the database, it can guess that the remote OS is the > same that the one in the database... snip > I want to implement a freebsd tool that cheats os fingerprinting. If I recall correctly, honeyd does this and much more. Check net/honeyd. Nikos
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4B6F371A.5070809>