Twenty Year Anniversary
Showing 1 - 11 of 11 RSS Feed


Posted Apr 27, 2000
Authored by Lance Spitzner | Site

Passive Fingerprinting is a method to learn more about the enemy, without them knowing it. Specifically, you can determine the operating system and other characteristics of the remote host using nothing more then sniffer traces. Though not 100% accurate, you can get surprisingly good results by looking at the TTL, TOS, Window Size, and DF bit. Includes information on changing your machines fingerprint on Linux and Solaris.

tags | paper, remote
systems | linux, unix, solaris
MD5 | 8bee07cbafbcbd2801a8aff717f7959d

Related Files

FingerTec Default Root Password / Remote Enrollment
Posted Jan 12, 2016
Authored by Daniel Lawson

FingerTec devices have a default root password that allows for remote enrollment.

tags | exploit, remote, root
MD5 | ce2fe3a49eb7de45039888fc293ea5d6
SinFP3 Fingerprinting Tool 1.00
Posted Sep 27, 2012
Authored by GomoR | Site

SinFP3 is a complete framework for network discovery. Its main purpose is to perform active fingerprinting, but it can also do passive fingerprinting. Both modes are available over IPv4 and IPv6. This new version introduces a plugin-based architecture, allowing anyone to develop their own tools around the framework.

tags | tool, scanner
systems | unix
MD5 | 73c1155f61818b5d1407d6577d9fab76
Posted Aug 26, 2002

No information is available for this file.

tags | bbs
MD5 | a8d2b5d2ad73353de0585c641e3dbf0f
Posted Aug 26, 2002

Fingerd backdoor - finger a certain username, and

tags | bbs
MD5 | e9b9aa7db232c20843ac3041cd874637
Posted Mar 8, 2002
Authored by Zenomorph | Site

Fingerprinting Port 80 Attacks - A look into web server, and web application attack signatures, Part Two. Includes fingerprints, advanced fingerprints, cross site scripting examples, modified headers, more encoding, webserver codes and logging, and more.

tags | paper, web, xss
MD5 | 017c5af72321622e81779bcd097b07fa
Posted Nov 22, 2001
Authored by gobbles | Site

Berkeley finger.cgi has a remote command execution vulnerability because it does not strip out newlines.

tags | exploit, remote, cgi
MD5 | 9684aed3ac871b146dc84de43c08404f
Posted Nov 6, 2001
Authored by Zenomorph | Site

Fingerprinting Port 80 Attacks - This paper looks at some of the signatures that are used in web server attacks and what to look for in your logs.

tags | paper, web
MD5 | 75f97cc427a782ee2a221d5344634bbd
Posted Jul 24, 2000

Weekly Newsletter from Help Net Security Issue 23 - 24.07.2000 - Covers weekly roundups of security related events. In this issue: Roxen v2.0.68 vulnerability, Local INN vulnerability, Outlook Persistant mail-browser link, Outlook malformed Email header vulnerability, O'Reilly Website Professtional overflow in webfind.exe, Ikey 1000 problems, HP Jetdirect FTP dos, Remotely Exploitable buffer overflow in Outlook, New encryption regulations, ACLU Challenge to Carnivore, First Autocad virus, Linux Distribution Security Report, Passive Fingerprinting, To Build a Honeypot, Auditing your Firewall Setup, and more.

tags | overflow, local, virus
systems | linux
MD5 | 480d71607e4c2a56aa9266b03465c7c4
Posted May 16, 2000
Authored by Lance Spitzner | Site

IDing remote hosts, without them knowing. This paper details the process of Passive Fingerprinting. Passive fingerprinting is based on sniffer traces from the remote system. Instead of actively querying the remote system, all you need to do is capture packets sent from the remote system. Based on the sniffer traces of these packets, you can determine the operating system of the remote host. Just like in active fingerprinting, passive fingerprinting is based on the principle that every operating system's IP stack has its own idiosyncrasies. By analyzing sniffer traces and identifying these differences, you may be able to determine the operating system of the remote host. Craig Smith has written a proof of concept tool called passfing.tar.gz.

tags | paper, remote, proof of concept
MD5 | 2aa7b3dc1c6b55b5165fe2debf6d98a4
Posted Aug 17, 1999
Authored by PGCI Inc

"Preventing remote OS detection via tcp/ip stack fingerprinting" - An excellent security improvement module describing how you can mask your operating system from tcp/ip stack fingerprinting tools such as nmap and queso while still being functional.

tags | remote, tcp
systems | unix
MD5 | d1f347a72ec4ad6abf4029e50e1538db
Posted Aug 17, 1999

Solaris 2.5.1/2.6 fingerd DoS attack.

tags | exploit, denial of service
systems | solaris
MD5 | 6596de0e5b2aead373e064be0dbf5472
Page 1 of 1

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

June 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    14 Files
  • 2
    Jun 2nd
    1 Files
  • 3
    Jun 3rd
    3 Files
  • 4
    Jun 4th
    18 Files
  • 5
    Jun 5th
    21 Files
  • 6
    Jun 6th
    8 Files
  • 7
    Jun 7th
    16 Files
  • 8
    Jun 8th
    18 Files
  • 9
    Jun 9th
    5 Files
  • 10
    Jun 10th
    2 Files
  • 11
    Jun 11th
    21 Files
  • 12
    Jun 12th
    32 Files
  • 13
    Jun 13th
    15 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    4 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    2 Files
  • 18
    Jun 18th
    15 Files
  • 19
    Jun 19th
    15 Files
  • 20
    Jun 20th
    15 Files
  • 21
    Jun 21st
    15 Files
  • 22
    Jun 22nd
    7 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By