Re: Methods for evading Nmap OS Fingerprinting

From: Cedric Blancher (blancher@cartel-securite.fr)
Date: Tue Mar 11 2003 - 09:03:15 PST

  • Next message: James Paterson: "Spike"

    Le dim 09/03/2003 a 13:17, David Barroso a ecrit :
    > Hello,
    > I've just released a brief paper about methods for defeating Nmap when
    > guessing the remote OS. Since most pen-testers run Nmap for OS discover,
    > they should know which apps are out there for fooling Nmap and how they
    > work.
    > http://voodoo.somoslopeor.com/papers.php
    
    You can also have a look to :
    
    	http://ippersonality.sourceforge.net/
    
    Which allows one to fool Nmap using Netfilter.
    
    -- 
    Cédric Blancher  <blancher@cartel-securite.fr>
    IT systems and networks security expert  - Cartel Sécurité
    Phone : +33 (0)1 44 06 97 87 - Fax: +33 (0)1 44 06 97 99
    PGP KeyID:157E98EE  FingerPrint:FA62226DA9E72FA8AECAA240008B480E157E98EE
    
    
    ----------------------------------------------------------------------------
    
    Are your vulnerability scans producing just another report?
    Manage the entire remediation process with StillSecure VAM's
    Vulnerability Repair Workflow.
    Download a free 15-day trial:
    http://www2.stillsecure.com/download/sf_vuln_list.html
    



    This archive was generated by hypermail 2b30 : Tue Mar 11 2003 - 11:08:16 PST