18 December 2006 | 12,446 views

SinFP 2.0.4 – OS Detection – Now Works On Windows

Check Your Web Security with Acunetix

SinFP is a new approach to OS fingerprinting, which bypasses limitations that nmap has.

Nmap approaches to fingerprinting as shown to be efficient for years. Nowadays, with the omni-presence of stateful filtering devices, PAT/NAT configurations and emerging packet normalization technologies, its approach to OS fingerprinting is becoming to be obsolete.

SinFP uses the aforementioned limitations as a basis for tests to be obsolutely avoided in used frames to identify accurately the remote operating system. That is, it only requires one open TCP port, sends only fully standard TCP packets, and limits the number of tests to 2 or 3 (with only 1 test giving the OS reliably in most cases).

SinFP 2.04 is now available, which for the first time, can now run under Windows ActivePerl.

More info here:

SinFP

SinFP has now more than 130 signatures in its database.

For Windows users, follow these instructions:

This was tested with ActivePerl 5.8.8.819, with PPM v4.0.

If you have error messages about failing to load some .dll, go to www.microsoft.com. Then, in the search field, type in vcredist_x86.exe, download it and install it.



Recent in Hacking Tools:
- clipcaptcha – CAPTCHA Service Impersonation Tool
- dirs3arch – HTTP File & Directory Brute Forcing Tool
- ODAT (Oracle Database Attacking Tool) – Test Oracle Database Security

Related Posts:
- SinFP v2.00 Released – Next Generation OS Detection Tool
- SinFP – Next Generation OS Detection Tool
- Ferret Version 1.1 – Data Seepage Detection Tool

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,858,218 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,044,019 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 619,411 views

Low-cost VPS Hosting

Comments are closed.