Questions tagged [fingerprinting]

Gaining information about current version of an application or operating system in order to find a vulnerability.

Fingerprinting is a term that describes the process of identifying a system based upon the services it runs and the behaviour it exhibits.

141 questions
1
vote
1 answer

How to fingerprint a server with Netcat?

I am trying to follow the OWASP test guide on a Kali Linux machine. As the first step in "Information Gathering" I am trying to fingerprint the server. The guide instructs me to use NetCat: $ nc www.xxx.yy 80 But after several attempts I always get…
Hoper
  • 255
  • 3
  • 10
1
vote
1 answer

Passive fingerprinting of DNS client

Given a network trace that includes DNS request packets, is it possible to infer or guess which DNS client send those requests? In other words, consider a network monitoring box that can see all the DNS packets sent from/to a particular host. Can…
D.W.
  • 98,420
  • 30
  • 267
  • 572
1
vote
1 answer

What is vulnerable in this comprehensive browser setup to avoid fingerprinting/tracking?

What is vulnerable in this browser setup to avoid fingerprinting/tracking for general browsing that is still easy to use? The setup is as follows: Firefox on my personal machine with several profiles (3-5 profiles)--each profile is dedicated to…
1
vote
3 answers

Fingerprinting users based on IP addresses

Is your local IP address used to better "fingerprint" a specific user? As far as I understood TCP connections, your local IP is send to the remote server in IP packets. It could add to the overall identification.
sanjihan
  • 639
  • 2
  • 7
  • 11
1
vote
1 answer

OS fingerprinting via TCP

I have searched online about this topic and the only information I got is that TCP SYN/ACK can be used to know the type of the target OS. If that is true, I don't understand how this occurs? Does TCP handshaking lead to OS fingerprinting?
Steve
  • 135
  • 1
  • 1
  • 5
1
vote
4 answers

Fraud detection to avoid fake users

I know there is no 100% solution for fraud detection, but at least I want to set some level of confidence in this use case. Suppose that I have a system where: A user need to make a registration A user can only post one review per company…
1
vote
2 answers

Spoofing TCP/IP stack OS Fingerprinting attacks in OSX

We need to change our OSX fingerprint in order to impersonate the Android OS against "passive OS fingerprinting" attacks. For Windows machines there are tools/guides for doing that, but can't find any for Mac OSX machines :( This attack works even…
user91343
  • 19
  • 1
  • 3
0
votes
2 answers

Browser Fingerprinting and Passwords stored by browser

I am using the Firefox browser on a Linux system and it came to my knowledge that it is possible for sites to take a fingerprint of the user visiting their homepages. So I actually have four questions regarding the thread: 1) It was written in the…
0
votes
1 answer

Using OpenAppID without Snort

Cisco Security introduced open source application detection and control mechanism which called "OpenAppID". Which can be checked in the link Lets say I have a sniffer application for myself; if I implement lua base binding as snort do, can I use…
Kadir Erdem Demir
  • 487
  • 1
  • 6
  • 15
0
votes
1 answer

Throttle network based on OS

What do I need to learn/know to throttle a clients network based on his/her operating system. For example: Someone in my network using Kali Linux... I would like to throttle their traffic to trickle state. Is it possible to do this? If its…
0
votes
1 answer

Virtualization / Cloud-Stack fingerprinting from running VM

How can the host environment (not just the OS) be identified from a running guest VM. To determine what the underlying host and virtualization stacks being used actually are. I.e. whether there's a VMWare, Cisco, OpenStack or other IaaS solution…
binaryanomaly
  • 1,291
  • 3
  • 13
  • 21
0
votes
1 answer

Service banner checking for vulnerabilities offline

Has anybody seen a tool where you can collect Service banners from something like nmap, output them to a file, the vuln vulnerability checks offline?
dmaynor
  • 458
  • 2
  • 3
0
votes
1 answer

DNS Enumeration by IP Address

I know all baseline steps to do DNS enumeration over a domain. But my questions is: how can I enumerate a server when I do not know which domain it is managing and I only have its IP address? My scenario: I discovered 2 DNS servers running in a…
0
votes
0 answers

Best approaches to test collision detection in different browser fingerprinting approaches

There are various libraries available for browser fingerprint generation. Typically they generate a fingerprintId using some metadata from the browser. Given fingerprints from multiple libraries, could we somehow test how one is doing vs. the other?…
noi.m
  • 101
0
votes
1 answer

How to resist JA3 fingerprinting while browsing using common browsers (e.g. Firefox, Chrome, etc)

Background. Context. I use Firefox, Google Chrome, or Chromium on Linux. Question. How to have my browser resist the JA3 fingerprint, so that sites don't identify me by it? Thoughts. I guess it may involve a way to randomise the way my client…
caveman
  • 142
  • 7