Cheating OS fingerprinting

Nikos Vassiliadis nvass9573 at gmx.com
Sun Feb 7 21:57:12 UTC 2010


On 2/7/2010 3:54 PM, yavuz wrote:
> Hi all,
>
> I want to cheat os fingerprinting tools ( primary nmap) in my freebsd
> machine. Assume I am using freebsd 8 and I want to be seen as a windows xp
> machine when someone scans my ports.
>
> In order to determine target host's OS, nmap sends seven TCP/IP crafted
> packets (called tests) and waits for the answer. Results are checked against
> a database of known results (OS signatures database). If the answer matches
> any of the entries in the database, it can guess that the remote OS is the
> same that the one in the database...
snip
> I want to implement a freebsd tool that cheats os fingerprinting.

If I recall correctly, honeyd does this and much more.
Check net/honeyd.

Nikos


More information about the freebsd-questions mailing list