OS Fingerprinting

Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes... more

GraphicalOSfp is a python application which aims to collect random data issued by remote systems in IP and TCP sequences. These data are then displayed in a 3D referencial to highlight an attractor of the random engine of the remote machine.

The httprecon project is doing some research in the field of web server fingerprinting, also known as http fingerprinting. The goal is the highly accurate identification of given httpd implementations. This is very important within professional... more

NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows. NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any... more

Nmap ("Network Mapper") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules... more

p0f

0f is a tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind any incidental TCP/IP communications (often as little as a single normal SYN) without interfering in any way.... more

Passive Asset Detection System (PADS) was designed to supplement active scanners by combining a network sniffer with a rule-based detection engine similar to a network IDS. It will listen to a network and attempt to provide an up-to-date look at... more

Is a Passive Real-time Asset Detection System.It passively listen to network traffic and gathers information on hosts and services it sees on the network.This information can be used to map your network, letting you know what... more

This program listens on the wire for all traffic and does OS Identification based on what it sees. Main things it works to identify are: Windows Machines, HP devices (that use HP Switch Protocol), Cisco devices (that do CDP packets), IP Phones (... more

SinFP is a new approach to OS fingerprinting, which bypasses limitations that nmap has.

Nmap approaches to fingerprinting as shown to be efficient for years. Nowadays, with the omni-presence of stateful filtering devices, PAT/NAT... more

Pages

Subscribe to OS Fingerprinting