From owner-freebsd-questions@FreeBSD.ORG Sun Feb 7 21:57:12 2010 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 2325A106566B for ; Sun, 7 Feb 2010 21:57:12 +0000 (UTC) (envelope-from nvass9573@gmx.com) Received: from mailout-eu.gmx.com (mailout-eu.gmx.com [213.165.64.42]) by mx1.freebsd.org (Postfix) with SMTP id 6C2438FC0A for ; Sun, 7 Feb 2010 21:57:11 +0000 (UTC) Received: (qmail invoked by alias); 07 Feb 2010 21:57:09 -0000 Received: from adsl-1.91.140.53.tellas.gr (EHLO [192.168.73.193]) [91.140.53.1] by mail.gmx.com (mp-eu002) with SMTP; 07 Feb 2010 22:57:09 +0100 X-Authenticated: #46156728 X-Provags-ID: V01U2FsdGVkX18S5qQSWBwSHhdhIW+PfTPXhuwCrvN9w3KVwefC/e SZKEH4b52yRWNG Message-ID: <4B6F371A.5070809@gmx.com> Date: Sun, 07 Feb 2010 23:56:42 +0200 From: Nikos Vassiliadis User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.1.7) Gecko/20100111 Thunderbird/3.0.1 MIME-Version: 1.0 To: yavuz , "freebsd-questions@FreeBSD.org" References: <97371e801002070554n7a76a85fnbcce0cea7127cdb9@mail.gmail.com> In-Reply-To: <97371e801002070554n7a76a85fnbcce0cea7127cdb9@mail.gmail.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Y-GMX-Trusted: 0 X-FuHaFi: 0.67000000000000004 Cc: Subject: Re: Cheating OS fingerprinting X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 07 Feb 2010 21:57:12 -0000 On 2/7/2010 3:54 PM, yavuz wrote: > Hi all, > > I want to cheat os fingerprinting tools ( primary nmap) in my freebsd > machine. Assume I am using freebsd 8 and I want to be seen as a windows xp > machine when someone scans my ports. > > In order to determine target host's OS, nmap sends seven TCP/IP crafted > packets (called tests) and waits for the answer. Results are checked against > a database of known results (OS signatures database). If the answer matches > any of the entries in the database, it can guess that the remote OS is the > same that the one in the database... snip > I want to implement a freebsd tool that cheats os fingerprinting. If I recall correctly, honeyd does this and much more. Check net/honeyd. Nikos