Date: Sun, 23 Mar 2008 15:00:38 +0000 From: Rui Paulo <rpaulo@FreeBSD.org> To: =?us-ascii?B?PT9JU08tODg1OS0xP1E/RGFuaWVsX0RpYXNfR29uPUU3YWx2ZXNf?= <daniel@dgnetwork.com.br>, ?=@fnop.net Cc: freebsd-hackers@freebsd.org, freebsd-pf@freebsd.org, freebsd-net@freebsd.org Subject: Re: FreeBSD OS Detection and Uptime Message-ID: <20080323150038.GA17070@fnop.net> In-Reply-To: <47E5BD04.5050806@dgnetwork.com.br> References: <47E5BD04.5050806@dgnetwork.com.br>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, Mar 22, 2008 at 11:14:28PM -0300, =?ISO-8859-1?Q?Daniel_Dias_Gon=E7alves_ wrote: > Which methods used to prevent OS detection and uptime (nmap) ? > http://nmap.org/misc/defeat-nmap-osdetect.html#BSD > I tried, but not work. The TCP Drop SYN+FIN sysctl might help. % sysctl -d net.inet.tcp.drop_synfin net.inet.tcp.drop_synfin: Drop TCP packets with SYN+FIN set Regards. -- Rui Paulo
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20080323150038.GA17070>