O'Reilly logo

BackTrack 5 Cookbook by David De Smet, Willie Pritchett

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Operating system fingerprinting

At this point of the information gathering process, we should now have documented a list of IP addresses, active machines, and open ports identified from the target organization. The next step in the process is determining the running operating system of the active machines in order to know the type of systems we're pentesting.

Getting ready

A Wireshark capture file is needed in order to complete step 2 of this recipe.

How to do it...

Let's begin the process of OS fingerprinting from a terminal window:

  1. Using Nmap, we issue the following command with the -O option to enable the OS detection feature:
    nmap -O 192.168.56.102
    
  2. Use p0f to analyze a Wireshark capture file:
    p0f -s /tmp/targethost.pcap -o p0f-result.log -l
    
    p0f ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required