Operating System Fingerprinting
Open ports that are discovered during the port scanning phase need to be further investigated. The mere existence of an open port does not mean a vulnerability exists. Thus, attackers must probe for more information to determine whether vulnerabilities that exist can be exploited.
The open ports that are discovered during port mapping provide clues about which OS the target is running. Determining the OS that is running on a specific target is the purpose of OS fingerprinting. Once an OS is identified, it is possible to better focus the attacks that come later. After all, an attacker doesn’t want to waste time launching Windows exploits against Linux computers, and vice versa. To identify an OS, two different ...
Get Ethical Hacking: Techniques, Tools, and Countermeasures, 4th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.