New Tool And Technique For Remote Operating System Fingerprinting

نویسندگان

  • Franck Veysset
  • Olivier Courtay
  • Olivier Heen
چکیده

Information gathering is an essential part of acute vulnerability assessment, especially when the whole process is automated. In this context, host Operating System detection must be precise, even when networks are well defended. We present an original Operating System detection method, based on temporal response analysis. As a proof of concept, we release the open source tool called RING – for Remote Identification Next Generation – and suggest improvements in the paper. We also stress the interesting synergy of using RING together with stateof-the-art tools, such as NMAP [1] or X-Probe [2], for a better overall accuracy in automated vulnerability assessment. Index terms – Remote Operating System Detection, OS Fingerprinting, Automated Vulnerability Assessment, Internet Security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Machine Learning Techniques for Advanced Passive Operating System Fingerprinting

TCP/IP fingerprinting is the active or passive collection of information usually extracted from a remote computer’s network stack. The combination of such information can be then used to infer the remote operating system (OS fingerprinting). OS fingerprinting is traditionally based on a database of “signatures”. A signature comprises several features (i.e., pairs attribute/value) extracted from...

متن کامل

Blackhat fingerprinting of the wired and wireless honeynet

TCP/IP fingerprinting is a common technique used to detect unique network stack characteristics of an Operating System (OS). Its usage for network compromise is renowned for performing host discovery and in aiding the blackhat to determine a tailored exploit of detected OSs. The honeyd honeynet is able to countermeasure blackhats utilising TCP/IP fingerprinting via host device emulation on a vi...

متن کامل

Toward Undetected Operating System Fingerprinting

Tools for active remote operating system fingerprinting generate many packets and are easily detected by host and network defensive devices such as IDS/NIDS. Since each additional packet increases the probability of detection, it is advantageous to minimize the number of probe packets. We make use of an informationtheoretic measure of test quality to evaluate fingerprinting probes and use this ...

متن کامل

A Novel Fault Detection and Classification Approach in Transmission Lines Based on Statistical Patterns

Symmetrical nature of mean of electrical signals during normal operating conditions is used in the fault detection task for dependable, robust, and simple fault detector implementation is presented in this work. Every fourth cycle of the instantaneous current signal, the mean is computed and carried into the next cycle to discover nonlinearities in the signal. A fault detection task is complete...

متن کامل

Design of Cross Layer Based Intrusion Detection Technique for Wireless Lan

In this chapter, a cross-layer based intrusion detection technique for wireless networks is proposed. The proposed technique uses a combined weight value that is computed from the received signal strength (RSS) and time taken for RTS-CTS Handshake (TT). 3.1 Introduction The rapid proliferation of wireless local area networks has changed the landscape of network security. The traditional way of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002