Operating System Fingerprinting with Packets (Part 1)

by Chris Sanders
Sept. 1, 2017 0 comments TechGenix Pen Testing & Audits hacking & cyberattacks

Context. It’s the single most important thing you have when approaching a system from an offensive or defensive perspective. If you are approaching a system through the eyes of an intruder then you will need to know everything you can about that system so that you can exploit it, exfiltrate data from it, and eventually cover your tracks as you make your escape. On the other hand, if you are defending a system then it’s knowledge of that systems architecture that will let you know what it may be vulnerable to, and if the activity you are watching is an indicator of compromise or simply noise on the wire. Context sets the stage for every action you take. It’s because of this that attackers and defenders spend so much time trying to gain this context.