Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
149
and TCP window sizes), and these slight variances create a fingerprint that Nmap can often
identify.
Nmap will inspect the traffic received from the target machine
and attempt to match the
fingerprint to a known list. By default, Nmap will display the detected
OS only if the retrieved
fingerprint is very accurate. Since we want to get a rough idea of the target OS, we include the –
osscan-guess
option to force Nmap print the guessed result even if is not fully accurate.
For example, let’s consider this simple nmap OS fingerprint scan.
kali@kali:~$
Yüklə
Dostları ilə paylaş: