System Identification

Active OS Fingerprinting

Nmap can scan a system and identify the OS

nmap -O 192.168.1.100

Another tool we can use is xprobe2

xprobe2 -p tcp:80:open 192.168.1.100

Passive OS Fingerprinting

equires a lot of patience

Objective: Capture TCP packets stealthily

p0f Scan

ARP poisoning attack

results matching ""

    No results matching ""