Os Fingerprinting Presentation
Os Fingerprinting Presentation
Os Fingerprinting Presentation
OS FINGERPRINTING:
Operating System (OS) fingerprinting is the science of determining the
operating system of a remote computer on the Internet.
This may be accomplished passively by sniffing network packets
travelling between hosts, actively by sending carefully crafted packets
to the target machine and analysing the response, or through nontechnical means. It is used by Security Professionals (known as Whitehats) and Hackers (Black-hats) alike for mapping remote networks
and determining which vulnerabilities might be present to exploit.
WHY OS FINGERPRINTING?
TYPES OF OS FINGERPRINTING:
There are basically two
types of os
fingerprinting , which
are as follows:
1.Active os finger
printing.
2.Passive os finger
printing.
ACTIVE OS FINGERPRINTING:
Active operating system fingerprinting is the method of actively
determining a targeted network nodes underlying operating system by
probing the targeted system with several packets and investigating the
response.
It is based on the fact that various os vendors implement the TCP stack
differently, and responses will differ based on the os.
The responses are then compared to a database to determine the
operating system.
Active fingerprinting is detectable because it repeatedly attempts to
connect with the same target system.
PASSIVE OS FINGERPRINTING
Passive fingerprinting is based on sniffer traces from the remote system. Instead
of actively querying the remote system, all it needs to do is capture packets
sent from the remote system. Based on the sniffer traces of these packets, you
can determine the operating system of the remote host. Just like in active
fingerprinting, passive fingerprinting is based on the principle that every
operating system's IP stack has its own individual characteristic. By analyzing
sniffer traces and identifying these differences, you may be able determine the
operating system of the remote host.
Passive fingerprinting usually goes undetective by any security system but is
less accurate than active fingerprinting.
TECHNIQUES OF OS FINGERPRINTING.
The techniques that are used for os finger printing can either be
automated or non automated, some of the most popular
techniques are as follows:
Banner grabbing.
Automated techniques:
Nmap.
NON-AUTOMATED TECHNIQUE:
Banner grabbing:
Though banner grabbing is the most basic and easiest form
of OS fingerprinting, it is often quite efficient and reliable.
The approach is simple and doesnt require any special
tools most of the time . Banner grabbing is the process of
opening a connection and reading the banner or response
sent by the application.
AUTOMATED TECHNIQUE
Nmap :
As its name implies, nmap is a network mapping utility. Provide nmap with
a TCP/IP address, and it will identify any open "doors" or ports that might be
available on that remote TCP/IP device. The real power behind nmap is the
amazing number of scanning techniques and options available! Each nmap
scan can be customized to be as blatantly obvious or as invisible as
possible. Some nmap scans can forge your identity to make it appear that a
separate computer is scanning the network, or simulate multiple scanning
decoys on the network.
AVOID OS FINGER
FINGERPRINTING(DEFEATING):
AVOIDING FINGERPRINTING(CNTD)
THERE ARE NUMBER OF WAYS THAT WE CAN AVOID OS FINGERPRINTING.
AVOIDING FINGERPRINTING(CNTD)
2. Defeating Active fingerprinting(nmap):
Method to defeat nmaps describe a traffic normalizer which defeats
nmaps active scans. They aim to confuse nmap, and do not attempt to
lie about their OS.
They also seem to hard code everything, rather than supporting nice
configured files.
CONCLUSION
OS fingerprinting is a fascinating subject that is of interest to the security
community. There are lot of techniques to do OS fingerprinting in the same time
there are number of ways to overcome/avoid OS finger printing. Remote OS
Fingerprinting is a recent development on the Internet and one to watch. The
ability to remotely determine, with high accuracy, the Operating System of a
remote host on the Internet is a powerful one.
In future, there will be extremely customized new attacks that will overcome all
the barriers and will be harder to avoid. The general trend towards increasing
penalties for being caught as the worlds cyber laws improve may also serve as
a driver towards more refined attacks in the future.
CONT..
What we have to remember is that, this is like a race when hackers
come up with a solution to avoid OS fingerprinting crackers come up
with a counter technique; hackers again develop a counter-counter
technique that will avoid the new technique discovered by crackers.
This cycle never ends. All what we have to do is getting updated with
the most recent technology to deal this.
REFERENCES:
[1] http://en.wikipedia.org/wiki/TCP/IP_stack_fingerprinting/
[2] Techniques in OS-Fingerprinting published by Nostromo,
Hagenberg, September 2005
[3] http://ettercap.sourceforge.net/
[4] http://www.netmap.com.au/
[5] http://
www.dummies.com/how-to/content/how-hackers-grab-banners-to-penetr
ate-your-network.html
REFERENCES
[6] http://www.networkuptime.com/nmap/page1-1.shtml
[7] http://
windows.microsoft.com/en-us/windows/telnet-commands#1TC=window
s-7