The term OS fingerprinting in Ethical Hacking refers to any method used to determine what operating system is running on a remote computer. This could be − Active Fingerprinting − Active fingerprinting is accomplished by sending specially crafted packets to a target machine and then noting down its response and analyzing the gathered information to determine the target OS. In the following section, we have given an example to explain how you can use NMAP tool to detect the OS of a target domain. Passive Fingerprinting − Passive fingerprinting is based on sniffer traces from the remote system. Based on the sniffer traces (such as Wireshark) of the packets, you can determine the operating system of the remote host. We have the following four important elements that we will look at to determine the operating system − TTL − What the operating system sets the Time-To-Live on the outbound packet. Window Size − What the operating system sets the Window Size at. DF −
This is a blog that gives you update on all latest and current gadgets that you may want to know about. welcome to BillyTech