SlideShare ist ein Scribd-Unternehmen logo
1 von 10
By
Mohammed Muzzamil. H
     M.Tech(IS)
                     Guided by
               Mrs.Ritu agarwal
   Basically finger print generally is the finger
    impression of humans to identify the
    individuals
   Device finger print is to identify the individual
    devices
    It is a compact summary
    of software and hardware settings collected
    from a remote computing device
   It is also called machine finger print
   Passive:
       TCP/IP configuration
       OS finger print
       Hardware clock skew
       OSI layer based
   Active:
       Invasive querying by the installation of executable
        codes on client machines
         Helps in finding the MAC address or unique serial
         numbers assigned to the device
one may infer client configuration
    parameters with the help of layers
   OSI Layer
    7: FTP, HTTP, Telnet, TLS/SSL, DHCP
   OSI Layer 5: SNMP, NetBIOS
   OSI Layer 4: TCP, UDP
   OSI Layer 3: IPv4, IPv6, ICMP, IEEE 802.11
   OSI Layer 2: SMB, CDP[9]
   Different operating systems, and different versions of the same
    operating system, set different defaults for these values
   Initial packet size (16 bits)
   Initial TTL (8 bits)
   Window size (16 bits)
   Max segment size (16 bits)
   Window scaling value (8 bits)
   "don't fragment" flag (1 bit)
   "sackOK" flag (1 bit)
   "nop" flag (1 bit)

   The values may be combined to form a 67-bit signature, or
    fingerprint, for the target machine
   With the help of the TTL and widow scaling we can find the OS
   Jpcap is an open source library for capturing
    and sending network packets from Java
    applications. It provides facilities to:
     capture raw packets live from the wire.
     save captured packets to an offline file, and
      read captured packets from an offline file.
     automatically identify packet types and generate
      corresponding Java objects (for
      Ethernet, IPv4, IPv6, ARP/RARP, TCP, UDP, and
      ICMPv4 packets).
     Filter the packets according to user-specified rules
      before dispatching them to the application.
     send raw packets to the network
   Version
   IP Header Length
   Size of Datagram
   Identification ( 16-bit number, together with the source address
    uniquely identifies this packet)
   Flags (a sequence of three flags (one of the 4 bits is unused))
   Fragmentation Offset
   Time To Live (Number of hops /links which the packet may be routed
    over)
   Protocol (e.g. 1 = ICMP; 2= IGMP; 6 = TCP; 17= UDP).
   Header Checksum (Packets with an invalid checksum are discarded by
    all nodes in an IP network)
   Source Address (the IP address of the original sender of the packet)
   Destination Address (the IP address of the final destination of the packet)
   Options (when used, the IP header length will be greater than five 32-bit
    words)
   OSI model
   TCP/IP finger printing
   OS fingerprinting

       Grouping all this we will get a strong signature or
        the device finger print

Weitere ähnliche Inhalte

Was ist angesagt? (19)

Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
 
T2 7 Chappell Network Forensics
T2 7 Chappell Network ForensicsT2 7 Chappell Network Forensics
T2 7 Chappell Network Forensics
 
Packet capture in network security
Packet capture in network securityPacket capture in network security
Packet capture in network security
 
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpUs 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wireshark
 
Linux Basic Networking Command
Linux Basic Networking CommandLinux Basic Networking Command
Linux Basic Networking Command
 
Intro tcpip-part1
Intro tcpip-part1Intro tcpip-part1
Intro tcpip-part1
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol Analyzer
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
 
Wireshark
WiresharkWireshark
Wireshark
 
Ports & sockets
Ports  & sockets Ports  & sockets
Ports & sockets
 
Chapter2ccna
Chapter2ccnaChapter2ccna
Chapter2ccna
 
Raspberry pi Part 22
Raspberry pi Part 22Raspberry pi Part 22
Raspberry pi Part 22
 
0
00
0
 
เคร อข ายคอมพ_วเตอร_ 1
เคร อข ายคอมพ_วเตอร_ 1เคร อข ายคอมพ_วเตอร_ 1
เคร อข ายคอมพ_วเตอร_ 1
 
Socket Programming w/ C# - IK
Socket Programming w/ C# - IKSocket Programming w/ C# - IK
Socket Programming w/ C# - IK
 
Np3
Np3Np3
Np3
 

Andere mochten auch

VGR 2015 Annual Report
VGR 2015 Annual ReportVGR 2015 Annual Report
VGR 2015 Annual ReportRenee Chapline
 
Unit 1 Basics Of Marketing
Unit 1  Basics Of MarketingUnit 1  Basics Of Marketing
Unit 1 Basics Of Marketingmrhennings
 
Share Market
Share MarketShare Market
Share Marketashtle
 
Industrial Electronic Equipments Case Study
Industrial Electronic Equipments Case StudyIndustrial Electronic Equipments Case Study
Industrial Electronic Equipments Case StudyVineet Panwar
 
Teaching via social networks(SOCIAL MEDIA FOR EDUCATION)
Teaching via social networks(SOCIAL MEDIA FOR EDUCATION)Teaching via social networks(SOCIAL MEDIA FOR EDUCATION)
Teaching via social networks(SOCIAL MEDIA FOR EDUCATION)Prof. Ibrahim Khaleel
 

Andere mochten auch (6)

R&M_Introduction
R&M_IntroductionR&M_Introduction
R&M_Introduction
 
VGR 2015 Annual Report
VGR 2015 Annual ReportVGR 2015 Annual Report
VGR 2015 Annual Report
 
Unit 1 Basics Of Marketing
Unit 1  Basics Of MarketingUnit 1  Basics Of Marketing
Unit 1 Basics Of Marketing
 
Share Market
Share MarketShare Market
Share Market
 
Industrial Electronic Equipments Case Study
Industrial Electronic Equipments Case StudyIndustrial Electronic Equipments Case Study
Industrial Electronic Equipments Case Study
 
Teaching via social networks(SOCIAL MEDIA FOR EDUCATION)
Teaching via social networks(SOCIAL MEDIA FOR EDUCATION)Teaching via social networks(SOCIAL MEDIA FOR EDUCATION)
Teaching via social networks(SOCIAL MEDIA FOR EDUCATION)
 

Ähnlich wie Device finger printing

Derevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse gameDerevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse gameJaime Sánchez
 
Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetDavid Sweigert
 
an_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptan_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptIwan89629
 
Nmap & Network sniffing
Nmap & Network sniffingNmap & Network sniffing
Nmap & Network sniffingMukul Sahu
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdfeyebolloptics
 
Operating System Fingerprinting Prevention
Operating System Fingerprinting PreventionOperating System Fingerprinting Prevention
Operating System Fingerprinting Preventiondcalhoun1984
 
Mirage: ML kernels in the cloud (ML Workshop 2010)
Mirage: ML kernels in the cloud (ML Workshop 2010)Mirage: ML kernels in the cloud (ML Workshop 2010)
Mirage: ML kernels in the cloud (ML Workshop 2010)Anil Madhavapeddy
 
Networking question
Networking questionNetworking question
Networking questionDEVBEJ
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.pptssuserf7cd2b
 
Basic networking
Basic networkingBasic networking
Basic networkingajeeshr3
 
IDS_WK_Arsalan.pptx
IDS_WK_Arsalan.pptxIDS_WK_Arsalan.pptx
IDS_WK_Arsalan.pptxaskaripayalo
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdfhoang971
 
Ospf routing protocol in gns3
Ospf routing protocol in gns3Ospf routing protocol in gns3
Ospf routing protocol in gns3Prashant Joshi
 

Ähnlich wie Device finger printing (20)

Derevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse gameDerevolutionizing OS Fingerprinting: The cat and mouse game
Derevolutionizing OS Fingerprinting: The cat and mouse game
 
Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheet
 
OS Fingerprinting
OS FingerprintingOS Fingerprinting
OS Fingerprinting
 
an_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptan_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.ppt
 
Nmap & Network sniffing
Nmap & Network sniffingNmap & Network sniffing
Nmap & Network sniffing
 
Linuxnetworkingcommands
LinuxnetworkingcommandsLinuxnetworkingcommands
Linuxnetworkingcommands
 
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
1)Please explain the commands ifconfig, ping, traceroute, netstat, d.pdf
 
Operating System Fingerprinting Prevention
Operating System Fingerprinting PreventionOperating System Fingerprinting Prevention
Operating System Fingerprinting Prevention
 
Mirage: ML kernels in the cloud (ML Workshop 2010)
Mirage: ML kernels in the cloud (ML Workshop 2010)Mirage: ML kernels in the cloud (ML Workshop 2010)
Mirage: ML kernels in the cloud (ML Workshop 2010)
 
Networking question
Networking questionNetworking question
Networking question
 
07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt07 - TCP_IP and the DoD Model.ppt
07 - TCP_IP and the DoD Model.ppt
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
ICMPV4
ICMPV4ICMPV4
ICMPV4
 
Basic networking
Basic networkingBasic networking
Basic networking
 
6
66
6
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
IDS_WK_Arsalan.pptx
IDS_WK_Arsalan.pptxIDS_WK_Arsalan.pptx
IDS_WK_Arsalan.pptx
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdf
 
Ospf routing protocol in gns3
Ospf routing protocol in gns3Ospf routing protocol in gns3
Ospf routing protocol in gns3
 
Internet Protocol
Internet ProtocolInternet Protocol
Internet Protocol
 

Kürzlich hochgeladen

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 

Kürzlich hochgeladen (20)

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 

Device finger printing

  • 1. By Mohammed Muzzamil. H M.Tech(IS) Guided by Mrs.Ritu agarwal
  • 2. Basically finger print generally is the finger impression of humans to identify the individuals
  • 3. Device finger print is to identify the individual devices  It is a compact summary of software and hardware settings collected from a remote computing device  It is also called machine finger print
  • 4. Passive:  TCP/IP configuration  OS finger print  Hardware clock skew  OSI layer based
  • 5. Active:  Invasive querying by the installation of executable codes on client machines  Helps in finding the MAC address or unique serial numbers assigned to the device
  • 6. one may infer client configuration parameters with the help of layers  OSI Layer 7: FTP, HTTP, Telnet, TLS/SSL, DHCP  OSI Layer 5: SNMP, NetBIOS  OSI Layer 4: TCP, UDP  OSI Layer 3: IPv4, IPv6, ICMP, IEEE 802.11  OSI Layer 2: SMB, CDP[9]
  • 7. Different operating systems, and different versions of the same operating system, set different defaults for these values  Initial packet size (16 bits)  Initial TTL (8 bits)  Window size (16 bits)  Max segment size (16 bits)  Window scaling value (8 bits)  "don't fragment" flag (1 bit)  "sackOK" flag (1 bit)  "nop" flag (1 bit)  The values may be combined to form a 67-bit signature, or fingerprint, for the target machine  With the help of the TTL and widow scaling we can find the OS
  • 8. Jpcap is an open source library for capturing and sending network packets from Java applications. It provides facilities to:  capture raw packets live from the wire.  save captured packets to an offline file, and read captured packets from an offline file.  automatically identify packet types and generate corresponding Java objects (for Ethernet, IPv4, IPv6, ARP/RARP, TCP, UDP, and ICMPv4 packets).  Filter the packets according to user-specified rules before dispatching them to the application.  send raw packets to the network
  • 9. Version  IP Header Length  Size of Datagram  Identification ( 16-bit number, together with the source address uniquely identifies this packet)  Flags (a sequence of three flags (one of the 4 bits is unused))  Fragmentation Offset  Time To Live (Number of hops /links which the packet may be routed over)  Protocol (e.g. 1 = ICMP; 2= IGMP; 6 = TCP; 17= UDP).  Header Checksum (Packets with an invalid checksum are discarded by all nodes in an IP network)  Source Address (the IP address of the original sender of the packet)  Destination Address (the IP address of the final destination of the packet)  Options (when used, the IP header length will be greater than five 32-bit words)
  • 10. OSI model  TCP/IP finger printing  OS fingerprinting  Grouping all this we will get a strong signature or the device finger print