Table of Contents
- Introduction
- Usage and Examples
- TCP/IP Fingerprinting Methods Supported by Nmap
- Probes Sent
- Response Tests
- TCP ISN greatest common divisor (
GCD
) - TCP ISN counter rate (
ISR
) - TCP ISN sequence predictability index (
SP
) - TCP IP ID sequence generation algorithm (
TI
) - ICMP IP ID sequence generation algorithm (
II
) - Shared IP ID sequence Boolean (
SS
) - TCP timestamp option algorithm (
TS
) - TCP options (
O
,01–06
) - TCP initial window size (
W
,W1
–W6
) - Responsiveness (
R
) - IP don't fragment bit (
DF
) - Don't fragment (ICMP) (
DFI
) - IP initial time-to-live (
T
) - IP initial time-to-live guess (
TG
) - Explicit congestion notification (
CC
) - TCP miscellaneous quirks (
Q
) - TCP sequence number (
S
) - ICMP sequence number(
SI
) - TCP acknowledgment number (
A
) - TCP flags (
F
) - TCP RST data checksum (
RD
) - IP type of service (
TOS
) - IP type of service for ICMP responses (
TOSI
) - IP total length (
IPL
) - Unused port unreachable field nonzero (
UN
) - Returned probe IP total length value (
RIPL
) - Returned probe IP ID value (
RID
) - Integrity of returned probe IP checksum value (
RIPCK
) - Integrity of returned probe UDP length and checksum (
RUL
andRUCK
) - Integrity of returned UDP data (
RUD
) - ICMP response code (
CD
) - IP data length for ICMP responses (
DLI
)
- TCP ISN greatest common divisor (
- Fingerprinting Methods Avoided by Nmap
- Understanding an Nmap Fingerprint
- OS Matching Algorithms
- Dealing with Misidentified and Unidentified Hosts
Komentar