PCAP Extractor and OS Fingerprinting
Abstract
This chapter focuses on two key capabilities: 1) the ability to extract key data from pcap files to convert them into the .ipDict and .osDict format. 2) the development of an extensible method of Passive OS Fingerprinting based on a truth table, which is based on the core data stored in the osDict.
Keywords
“It is by doubting that we come to investigate, and by investigating that we recognize the truth.”
Peter Abelard
Get Python Passive Network Mapping now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.