Ethical Hacking — Week 4
Target Discovery
In today’s session I learned about fingerprinting and nmap.
There are different types of fingerprinting, one of them is Passive fingerprinting. Passive fingerprinting is the practice of determining a remote operating system by measuring the peculiarities of observes traffic without actively sending probes to the host. No single signature can reliably determine the remote operating system.However, by looking at several signatures and combining the information, the accuracy of identifying the remote host increases. P0f and Siphon are examples of passive fingerprinting tools.Though Passive fingerprinting is powerful, it has limitations. The tools must reside in places that can sniff target hosts’ traffic.
nmap is a TCP/IP stack fingerprinting tool which tests the response of the remote system to undefined combinations of TCP flags, TCP ISN sampling, determining the default setting of the DF bit, TCP initial windows size, ToS setting, fragmentation handling and order of TCP options. nmap fingerprints a system in three steps:
- 1.Port Scanning
- 2.Ad-hoc forged packets sending
- 3.Analysis of responses received and comparison against a database of known OS’s behaviour
Tags: Ethical Hacking
This entry was posted on Friday, March 13th, 2020 at 4:56 pm and is filed under Database System -- Semester 3, Ethical Hacking -- Semester 4, Intelligent System -- Semester 4, Network Forensic -- Semester 5, Uncategorized. You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed.