1 |
I think OS detection's success in part depends on the number of ports exposed. |
2 |
I for one have only 2 ports exposed, one is SSH and the other is http. Nmap |
3 |
often detects my system as a palm pilot (wierd huh). |
4 |
|
5 |
One other thing you can look into is randomized tcp sequence numbers. I am |
6 |
not sure but I think this is in some of the newer kernels. |
7 |
|
8 |
-Jonathan S. Romero |
9 |
|
10 |
On Sunday 05 October 2003 06:59 am, Nick Van Vlaenderen wrote: |
11 |
> Hi all, |
12 |
> |
13 |
> I was wondering how I could hide my uptime and OS for portscans. If |
14 |
> someone scans my server (for example using Nmap), he can see what OS I am |
15 |
> running and what the uptime of the box is. Does anyone know which firewall |
16 |
> rule I need to prevent this? And how does Nmap collect this information? |
17 |
> Is it related to what services there are running on the server? |
18 |
> |
19 |
> Regards, |
20 |
> |
21 |
> Nick Van Vlaenderen |
22 |
> |
23 |
> -- |
24 |
> The software said "Microsoft Windows 95 or better", so I tried *nix! |
25 |
> Bow for opensource development! |
26 |
> |
27 |
> Aoccdrnig to rscheearch at an Elingsh uinervtisy, it deosn't mttaer in |
28 |
> waht oredr the ltteers in a wrod are, the olny iprmoetnt tihng is taht the |
29 |
> frist and the lsat ltteer is at the rghit pclae. The rset can be a toatl |
30 |
> mses and you can sitll raed it wouthit porbelms. Tihs is bcuseae we do not |
31 |
> raed ervey lteter by itslef, but the wlohe wrod. |