IP Fingerprinting Probes |
Attack Pattern ID: 314 (Standard Attack Pattern) | Typical Severity: Low | Status: Draft |
Summary
An attacker engages in IP-based techniques for the purpose of fingerprinting operating systems on the network. By interrogating a particular IP stack implementation with IP segments that deviate from the ordinary or expected rules of RFC 791, an attacker can construct a fingerprint of unique behaviors for the target operating system. When this set of behaviors is analyzed against a database of known fingerprints, an attacker can make reliable inferences about the operating system type and version.
Target Attack Surface Description
Targeted OSI Layers: Network Layer
Target Attack Surface Localities
Target Attack Surface Types: Host
Target Functional Services
Target Functional Service 1: None | |||
---|---|---|---|
Protocol 1: ICMP | |||
|
The ability to send and receive TCP segments from a target in order to identify a particular TCP stack implementation.
Nature | Type | ID | Name | Description | View(s) this relationship pertains to![]() |
---|---|---|---|---|---|
ChildOf | ![]() | 312 | Active OS Fingerprinting | Mechanism of Attack (primary)1000 | |
ParentOf | ![]() | 317 | IP ID Sequencing Probe | Mechanism of Attack (primary)1000 | |
ParentOf | ![]() | 318 | IP 'ID' Echoed Byte-Order Probe | Mechanism of Attack (primary)1000 | |
ParentOf | ![]() | 319 | IP (DF) 'Don't Fragment Bit' Echoing Probe | Mechanism of Attack (primary)1000 |