One way to defend against OS fingerprinting from tools such as nmap, queso, p0f, xprobe etc is to change the metrics that they base their analysis on. One way to do this with OpenBSD is to use Sealing Wafter. Goals of Sealing Wafter: 1. To reduce OS detection based on well known fingerprints network stack […]
Tag Archive | "tcpip-fingerprinting"
I’ve seen quite a lot of discussion lately on how to ‘defend against nmap’ or how to change the properties of your TCP/IP Stack so your Windows OS appears to be something else (As in you can guess the OS from the TTL value passed back in a TCP/IP packet). One way you can do […]