Date: Mon, 08 Feb 2010 00:41:59 +0100 From: Dominic Fandrey <kamikaze@bsdforen.de> To: yavuz <sakncli@gmail.com> Cc: freebsd-questions@freebsd.org Subject: Re: Cheating OS fingerprinting Message-ID: <4B6F4FC7.5090705@bsdforen.de> In-Reply-To: <97371e801002070554n7a76a85fnbcce0cea7127cdb9@mail.gmail.com> References: <97371e801002070554n7a76a85fnbcce0cea7127cdb9@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
yavuz wrote: > Hi all, > > I want to cheat os fingerprinting tools ( primary nmap) in my freebsd > machine. Assume I am using freebsd 8 and I want to be seen as a windows xp > machine when someone scans my ports. > > ... > I want to implement a freebsd tool that cheats os fingerprinting. As I said, > I have to analyze all incomming packets as a firewall and do some job if > packets are comming from a scanner. Can I implement this feature as a patch > to PF, or does PF provides some mechanisms to write extension modules? Can > you give any advices? Where is to start:) Well, you can simply redirect all traffic to a port on localhost, where your service is listening. However, said service needs to forward the regular traffic to the assigned ports in order to not block your entire networking capabilities. -- A: Because it fouls the order in which people normally read text. Q: Why is top-posting such a bad thing? A: Top-posting. Q: What is the most annoying thing on usenet and in e-mail?
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4B6F4FC7.5090705>