Jump to content

TCP/IP stack fingerprinting

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Markaci (talk | contribs) at 14:13, 25 April 2005 ('''TCP/IP stack fingerprinting''' (or OS fingerprinting) is the process in computing of determining the identity of a remote host's operating system by analyzing packets from that host.). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)

TCP/IP stack fingerprinting (or OS fingerprinting) is the process in computing of determining the identity of a remote host's operating system by analyzing packets from that host.

There are two different types, active and passive. Passive OS fingerprinting identifies the remote operating system with with packets that are received, without sending any packets. Active OS fingerprinting, by contrast, sends packets (sometimes odd packets) and waits for a response (or lack of one).