Nitin Tiwari, Rajdeep Solanki, Gajaraj Pandya


There are many, many techniques which can be used to fingerprint networking stacks.  Basically, you just look for things that differ among operating systems and write a investigation for the difference. Remote OS Finger stamping is a part of the surveying steps of any goal network attack. Surveying is a practice used by skilled hackers to size up and collect information about their goal. There are various ways to go about collecting any given piece of information related to a goal that would yield penetrability. One of the most significant pieces of knowledge that a hacker could have is the flavor and version O/S of a remote host. One emerging technology is fingerprinting tools that are themselves automated as part of OS refined attack tools.


Finger printing,Finger stamping,remote operating system,network security


Arkin, and Yarochkin. “Xprobe v2.0: A “Fuzzy” Access to Remote Active

Beck, Rob. “Passive-Aggressive Resistance: OS Finger stamping Masquerade”

David Barroso Berrueta, “A practical access for defeating Nmap OS Finger stamping”, November 2002.

Fyodor Yarochkin and Ofir Arkin, “Xprobe2 - A'Fuzzy' Access to Remote

Active O/S Finger stamping” com/archive/papers/Xprobe2.pdf

Finger stamping: The Complete Documentation,

Kathy Wang, “Frustrating OS Finger stamping with Morph”, Syn Ack Labs,

Robert Beverly, “A Robust Classifier for Passive TCP/IP Finger stamping”,

March 2004

Ryan Spangler, “Analysis of Remote Active O/S Finger stamping

Tools”, Packetwatch Research, May 2003.

Thomas Glaser, Intrusion Search FAQ, “TCP/IP Stack Finger stamping

Full Text: PDF


  • There are currently no refbacks.


All Rights Reserved © 2012 IJARCSEE

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 Unported License.