lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <a116aff00511211228p212df1a6hccb166fb5b636ba4@mail.gmail.com> Date: Mon Nov 21 20:28:53 2005 From: naveedafzal at gmail.com (naveed) Subject: Host fingerprinting with hping [paper] This paper discusses some of the techniques that can be effectively used in host fingerprinting. The paper will specially cover the cases where network hosts are behind firewalls. We will explain the techniques with various tools but the majority of the work is based on a simple and powerful utility named hping. The OS fingerprinting is reviwed in certain fire walled environments, also it has been tried to analyze the methods in detail that brings us the advantages and disadvantages of some techniques and the usage of hping as an auditing tool. The original paper can be found here http://bsdpakistan.org/downloads/HostFingerprinting.pdf naveed NUCES-FAST LHR