sumber:http://sectools.org/os-detectors.html
1. P0f : A versatile passive OS fingerprinting tool
P0f is able to identify the operating system of a target host simply by examining captured packets even when the device in question is behind an overzealous packet firewall. P0f does not generate ANY additional network traffic, direct or indirect. No name lookups, no mysterious probes, no ARIN queries, nothing. In the hands of advanced users, P0f can detect firewall presence, NAT use, existence of load balancers, and more!
2. Xprobe2 : Active OS fingerprinting tool
XProbe is a tool for determining the operating system of a remote host. They do this using some of the same techniques as Nmap as well as some of their own ideas. Xprobe has always emphasized the ICMP protocol in its fingerprinting approach.
Blog untuk berbagi pengetahuan saja apa yang kami tahu dan apa yang telah kami lakukan hanya untuk di share, Seluruh artikel di blog semata mata bertujuan untuk sharing dan berbagi ilmu pengetahuan. Diperoleh dari berbagai sumber dan referensi di dunia maya. Bagi para penulis artikel kami ucapkan terima kasih sebesar besarnya.
Tidak ada komentar:
Posting Komentar