NWPS Logo

Search  Search Site Become a Facebook Fan Follow us on Twitter NetScanTools Blog NetScanTools YouTube Channel
OS Fingerprinting
Home Products Download Social Media Support Contact us About us Search SiteMap
  NetScanToolsŪ Pro
NetScanToolsŪ LE
NetScanToolsŪ Basic
NetScanToolsŪ Std
Switch Port Mapping Tool
IPv6ScopeFinder
ipPulse
Videos
Product Pricing
How to Buy
Resellers
Distributors
Freeware
Press Resources
Newsletters
 
 
  Demo
Get the NetScanTools Pro demo here.
 

 

  Warning:
NEVER scan a computer you do not own or have the owner's permission to scan.
 
 


- Last Review: June 8, 2016

Home > NetScanTools Pro > Technical Details > OS Fingerprinting Tool

OS Fingerprinting Tool Description

6-8-2016 Note: we are currently evaluating the continued inclusion of this tool in NetScanTools Pro. It is based on ICMP techniques and will not give OS identifications as accurate as those provided by nmap. If you want the best, use nmap for OS Fingerprinting.

OS (operating system) Fingerprinting - this is a fascinating subject that is of interest to the security community. There are many different ways to approach this subject. Some unix based programs (like nmap) do a very good job of fingerprinting operating systems using such means as TCP and UDP response characteristics. Of course, there are some simple ways to identify operating systems by observing banners or header from a web server, an ftp server or even a telnet or SMTP login banner. The method presented here is based upon the ICMP packet response research done by Ofir Arkin (www.sys-security.com). His paper is called ICMP Usage In Scanning and it has been the subject of magazine articles and discussions within the security community. The implementation here should be considered experimental and should not be considered a complete implementation of his research in this first version. The results you see using this tool may or may not be accurate, however, some operating systems lend themselves to very direct identification using only ICMP packets and those will be readily apparent.

Without getting too far into the operating specifics, this tool relies on sending altered versions of basic ICMP packet types to the target:

We then look at the responses and send further variations of those basic packet types. The responses of the target operating system are noted and use to classify the type of target operating system.

Screenshot - Successful Identification of an HP Network Connected 4050 printer


 

Home | About us | Contact us | Privacy Policy | Search | Site Map

Copyright 1995-2016 Northwest Performance Software, Inc. DBA NetScanTools.com. All Rights Reserved.
'NetScanTools Pro', 'NetScanTools Standard', 'NetScanTools LE', 'NetScan', 'ipPulse', 'Northwest Performance Software' and 'NetScanTools.com'
are trademarks of Northwest Performance Software, Inc.
'NetScanTools' is a registered trademark of Northwest Performance Software, Inc.