Twenty Year Anniversary
Showing 1 - 6 of 6 RSS Feed


Posted Mar 22, 2006
Authored by Val Smith | Site

Detecting the Presence of Virtual Machines Using the Local Data Table - This paper describes a method for determining the presence of virtual machine emulation in a non-privileged operating environment. This attack is useful for triggering anti-virtualization attacks and evading analysis.

tags | paper, local
MD5 | 92a990116970ebe86c383ab30e4ac4c1
Posted Mar 26, 2005
Authored by tkohno | Site

Remote physical device fingerprinting by exploiting small, microscopic deviations in device hardware: clock skews. Presents research showing accuracy equivalent to DNA matches, even when the target was hundreds of milliseconds away.

tags | paper, remote
MD5 | d9e6959691955d6c56f6b903643b9f8a
Posted Jul 28, 2003
Authored by STE Jones | Site

Paper discussing utilization of port zero for OS fingerprinting and how to protect against it.

tags | paper
MD5 | bcd6916661d1dd7789bd056c6ab8e767
Posted Feb 21, 2001
Authored by Fobic | Site

Remote OS Detection using LPD Querying - Line printer daemons listening on TCP port 515 can give away information about which OS is running. Proof of concept code which contains a database of LPD returned messages and OS matches here.

tags | paper, remote, tcp, proof of concept
MD5 | 4e667a19a6fc4fd69e37e0ce2175a2da
Posted Feb 13, 2001
Authored by Fobic | Site

Examining Advanced Remote OS Detection Methods/Concepts using Perl - This paper discusses the theory and practice behind OS detection with a specific focus on the practice related to the PERL programming language. Methods and concepts for remote operating system detection are closely examined and implemented into Perl code.

tags | paper, remote, perl
MD5 | ae8c4eb4e2c8beb1a0dce5dd6872a449
Posted Oct 26, 1999
Authored by pho

Pho's alternate remote OS detection techinques page has been updated. Includes information on ICMP techniques, ARP techniques, IP techniques, and UDP techniques.

tags | paper, remote, udp
MD5 | bbc82d05af7c37437490790e3576a887
Page 1 of 1

Top Authors In Last 30 Days

Recent News

News RSS Feed
One Email Account With Clout Can Unleash Phishing Hell
Posted Sep 24, 2018

tags | headline, cybercrime, fraud, password, phish
SHEIN Fashion Retailer Announces Breach Affecting 6.42 Million Users
Posted Sep 24, 2018

tags | headline, hacker, privacy, cybercrime, data loss, fraud
Code-Cracking WW2 Bombe Operation Recreated At Bletchley
Posted Sep 24, 2018

tags | headline, britain, cyberwar, germany, science, cryptography
Twitter Warns Direct Messages Were Exposed
Posted Sep 24, 2018

tags | headline, privacy, data loss, flaw, twitter
Scottish Brewery Recovers From Ransomware Attack
Posted Sep 21, 2018

tags | headline, malware, scotland
Romanian CCTV Ransomware Culprit Admits Guilt
Posted Sep 21, 2018

tags | headline, government, malware, usa, fraud, romania
Thousands Of WordPress Sites Backdoored With Malicious Code
Posted Sep 21, 2018

tags | headline, hacker, malware, flaw, wordpress
Facebook Told To Speed Up Changes Or Face Sanctions
Posted Sep 21, 2018

tags | headline, government, privacy, facebook, social
Equifax Fined By ICO Over Data Breach That Hit Britons
Posted Sep 20, 2018

tags | headline, privacy, britain, data loss, fraud, identity theft
Hackers Steal Credit Cards From Newegg, Researchers Say
Posted Sep 19, 2018

tags | headline, hacker, cybercrime, data loss, fraud
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By