Skip to content

Latest commit

 

History

History
32 lines (24 loc) · 1.05 KB

README.md

File metadata and controls

32 lines (24 loc) · 1.05 KB

impostor

spoof OS detection by messing with the tcp stack

Based on security cloak by Craig Heffner: https://web.archive.org/web/20061202015837/http://www.craigheffner.com/security/

Inspired by: https://nmap.org/book/nmap-defenses-trickery.html#nmap-defenses-os-spoofing

usage

./impostor <profile> profiles are defined in profiles.ini

Screenshots

Linux

Before:

nmap-ubuntu-1.png

After:

nmap-ubuntu-2.png

unfortunately the results are currently far form perfect. will most likely have to play with the window size on linux

Windows

Before:

nmap-windows.png

After:

nmap-windows-2.png

TODO

windows version

  • Continue research and explore advanced methods involing things like spoofed services