Active measures, like those employed by Nmap, are unfortunately not available when doing passive analysis of live traffic or when analyzing previously captured network traffic. Passive analysis requires much more subtle variations in the network traffic to be observed, in order to identify a computer’s OS. A simple but effective passive method is to inspect the initial Time To Live (TTL) in the IP header and the TCP window size (the size of the receive window) of the first packet in a TCP session, i.e. the SYN or SYN+ACK packet.
- Post author:jonathansblog
- Post published:July 14, 2019
- Post category:jonathansblog / Methodology / Pentest
- Post comments:0 Comments
Tags: Account, Address, Apple, Audio, Beta, Bluetooth, Book, Boot, Card, Category, Command, Connect, Control, Controller, Custom, Default, Digital, Display, Email, Error, Events, Exchange, File, Firefox, Firmware, Force, Free, Google, Group, Hide, Highlight, Home, Index, Internet, Ios, Ipad, Iphone, Link, Linux, List, Live, Local, Location, Login, Mac, Machine, Mini, Multi, Multiple, Music, Network, Nmap, Notification, Online, Open, Order, Osx, Outlook, Password, Personal, Play, Player, Pro, Purchased, Push, Quick, Record, Remote, Reverse, Rewrite, Safari, Save, Scan, Search, Secure, Send, Server, Session, Settings, Share, Size, Slow, Source, Ssh, Status, Store, Sure, Switch, Syntax, Text, Time, Tools, Url, Usb, User, Utility, Version, Video, Virtual, Web, Website, Wifi, Windows, Work, Xmpp