<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: find out an OS from the remote machine using nmap in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120507#M83345</link>
    <description>HI chris&lt;BR /&gt;&lt;BR /&gt;Run this command in linux to find out OS from CLI&lt;BR /&gt;&lt;BR /&gt;#nmap -sT -O &lt;IP_ADDRESS&gt;&lt;/IP_ADDRESS&gt;</description>
    <pubDate>Wed, 26 Dec 2007 06:46:07 GMT</pubDate>
    <dc:creator>Jeeshan</dc:creator>
    <dc:date>2007-12-26T06:46:07Z</dc:date>
    <item>
      <title>find out an OS from the remote machine using nmap</title>
      <link>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120499#M83337</link>
      <description>hi&lt;BR /&gt;&lt;BR /&gt;howto find out an OS from the remote machine using nmap from CLI ?&lt;BR /&gt;&lt;BR /&gt;kind regards&lt;BR /&gt;chris</description>
      <pubDate>Mon, 24 Dec 2007 02:48:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120499#M83337</guid>
      <dc:creator>'chris'</dc:creator>
      <dc:date>2007-12-24T02:48:05Z</dc:date>
    </item>
    <item>
      <title>Re: find out an OS from the remote machine using nmap</title>
      <link>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120500#M83338</link>
      <description>&lt;!--!*#--&gt;A Google search for "nmap" led directly to:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://insecure.org/nmap/" target="_blank"&gt;http://insecure.org/nmap/&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://insecure.org/nmap/docs.html" target="_blank"&gt;http://insecure.org/nmap/docs.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;    The Nmap project tries to defy the&lt;BR /&gt;    stereotype of some open source software&lt;BR /&gt;    being poorly documented by providing a&lt;BR /&gt;    comprehensive set of documentation for&lt;BR /&gt;    installing and using Nmap.  [...]&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://insecure.org/nmap/man/" target="_blank"&gt;http://insecure.org/nmap/man/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Of course, even the best documentation is of&lt;BR /&gt;little value if you don't _read_ it.</description>
      <pubDate>Mon, 24 Dec 2007 03:40:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120500#M83338</guid>
      <dc:creator>Steven Schweda</dc:creator>
      <dc:date>2007-12-24T03:40:22Z</dc:date>
    </item>
    <item>
      <title>Re: find out an OS from the remote machine using nmap</title>
      <link>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120501#M83339</link>
      <description>perhaps: &lt;BR /&gt;&lt;BR /&gt;nmap -O [target ip]&lt;BR /&gt;&lt;BR /&gt;but maybe an other program will be needed to encode the fingerprint.</description>
      <pubDate>Mon, 24 Dec 2007 04:38:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120501#M83339</guid>
      <dc:creator>'chris'</dc:creator>
      <dc:date>2007-12-24T04:38:05Z</dc:date>
    </item>
    <item>
      <title>Re: find out an OS from the remote machine using nmap</title>
      <link>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120502#M83340</link>
      <description>I mean to read (decode) the fingerprint.</description>
      <pubDate>Mon, 24 Dec 2007 05:01:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120502#M83340</guid>
      <dc:creator>'chris'</dc:creator>
      <dc:date>2007-12-24T05:01:34Z</dc:date>
    </item>
    <item>
      <title>Re: find out an OS from the remote machine using nmap</title>
      <link>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120503#M83341</link>
      <description>Shalom chris,&lt;BR /&gt;&lt;BR /&gt;Hackers commonly try to use this technique to obtain OS information. Many systems if properly secured will not provide this informaiton. Internet exposed systems should not so easily expose themselves to this query.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Mon, 24 Dec 2007 09:53:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120503#M83341</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2007-12-24T09:53:06Z</dc:date>
    </item>
    <item>
      <title>Re: find out an OS from the remote machine using nmap</title>
      <link>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120504#M83342</link>
      <description>sinfp seems to be nice.&lt;BR /&gt;&lt;BR /&gt;# sinfp -i hotmail.com -p 443 -C -V&lt;BR /&gt;P1: B11013 F0x12 W16384 O0204ffff M1460&lt;BR /&gt;P2: B11013 F0x12 W16384 O0204ffff010303000101080a000000000000000001010402 M1460&lt;BR /&gt;P3: B00000 F0 W0 O0 M0&lt;BR /&gt;IPv4: Windows NT&lt;BR /&gt;&lt;BR /&gt;*** File [sinfp4-127.0.0.1.anon.pcap] generation done.&lt;BR /&gt;*** Please send it to sinfp@gomor.org if you think this is not&lt;BR /&gt;*** the good identification, or if it is a new signature.&lt;BR /&gt;*** In this last case, please specify `uname -a' (or equivalent)&lt;BR /&gt;*** from the target host.&lt;BR /&gt;</description>
      <pubDate>Wed, 26 Dec 2007 02:22:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120504#M83342</guid>
      <dc:creator>'chris'</dc:creator>
      <dc:date>2007-12-26T02:22:41Z</dc:date>
    </item>
    <item>
      <title>Re: find out an OS from the remote machine using nmap</title>
      <link>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120505#M83343</link>
      <description>it's really very interesting that microsft uses on their download server linux:&lt;BR /&gt;&lt;BR /&gt;# sinfp -i download.microsoft.com -p 443 -C -V&lt;BR /&gt;P1: B10113 F0x12 W5840 O0204ffff M1460&lt;BR /&gt;P2: B10113 F0x12 W5792 O0204ffff0402080affffffff4445414401030300 M1460&lt;BR /&gt;P3: B00000 F0 W0 O0 M0&lt;BR /&gt;IPv4: Linux 2.4.x, 2.6.x&lt;BR /&gt;&lt;BR /&gt;*** File [sinfp4-127.0.0.1.anon.pcap] generation done.&lt;BR /&gt;*** Please send it to sinfp@gomor.org if you think this is not&lt;BR /&gt;*** the good identification, or if it is a new signature.&lt;BR /&gt;*** In this last case, please specify `uname -a' (or equivalent)&lt;BR /&gt;*** from the target host.&lt;BR /&gt;&lt;BR /&gt;# ssh download.microsoft.com&lt;BR /&gt;The authenticity of host 'download.microsoft.com (195.49.93.202)' can't be established.&lt;BR /&gt;DSA key fingerprint is ee:33:bd:ac:7b:6e:bd:0b:60:6e:49:20:56:cb:00:d3.&lt;BR /&gt;Are you sure you want to continue connecting (yes/no)?&lt;BR /&gt;</description>
      <pubDate>Wed, 26 Dec 2007 02:34:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120505#M83343</guid>
      <dc:creator>'chris'</dc:creator>
      <dc:date>2007-12-26T02:34:22Z</dc:date>
    </item>
    <item>
      <title>Re: find out an OS from the remote machine using nmap</title>
      <link>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120506#M83344</link>
      <description>microsft download website it's outsourced at Akamai but anaway on linux.</description>
      <pubDate>Wed, 26 Dec 2007 04:45:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120506#M83344</guid>
      <dc:creator>'chris'</dc:creator>
      <dc:date>2007-12-26T04:45:52Z</dc:date>
    </item>
    <item>
      <title>Re: find out an OS from the remote machine using nmap</title>
      <link>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120507#M83345</link>
      <description>HI chris&lt;BR /&gt;&lt;BR /&gt;Run this command in linux to find out OS from CLI&lt;BR /&gt;&lt;BR /&gt;#nmap -sT -O &lt;IP_ADDRESS&gt;&lt;/IP_ADDRESS&gt;</description>
      <pubDate>Wed, 26 Dec 2007 06:46:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120507#M83345</guid>
      <dc:creator>Jeeshan</dc:creator>
      <dc:date>2007-12-26T06:46:07Z</dc:date>
    </item>
    <item>
      <title>Re: find out an OS from the remote machine using nmap</title>
      <link>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120508#M83346</link>
      <description>thanks, but the nmap output is often a fingerprint:&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;OS:SCAN(V=4.20%D=12/26%OT=1%CT=23%CU=38968%PV=N%DS=8%G=Y%TM=477201E0%P=i386&lt;BR /&gt;OS:-portbld-freebsd6.2)SEQ(SP=105%GCD=1%ISR=107%TS=U)OPS(O1=M5B4%O2=M578%O3&lt;BR /&gt;OS:=M280%O4=M218%O5=M218%O6=M109)WIN(W1=2000%W2=2000%W3=2000%W4=2000%W5=200&lt;BR /&gt;OS:0%W6=2000)ECN(R=Y%DF=N%T=47%W=2000%O=M5B4%CC=S%Q=RU)T1(R=Y%DF=N%T=47%S=O&lt;BR /&gt;OS:%A=S+%F=AS%RD=0%Q=)T2(R=N)T3(R=Y%DF=N%T=47%W=2000%S=O%A=S+%F=ASF%O=M109%&lt;BR /&gt;OS:RD=0%Q=)T3(R=Y%DF=N%T=47%W=2000%S=O%A=O%F=ASF%O=M109%RD=0%Q=)T3(R=Y%DF=N&lt;BR /&gt;OS:%T=47%W=2000%S=O%A=S+%F=ASF%O=M109%RD=0%Q=)T4(R=N)T5(R=Y%DF=Y%T=40%W=0%S&lt;BR /&gt;OS:=Z%A=S+%F=AR%O=%RD=0%Q=)T5(R=Y%DF=Y%T=40%W=0%S=Z%A=O%F=AR%O=%RD=0%Q=)T5(&lt;BR /&gt;OS:R=Y%DF=Y%T=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)T6(R=N)T7(R=N)U1(R=Y%DF=N%T=4&lt;BR /&gt;OS:0%TOS=0%IPL=164%UN=0%RIPL=G%RID=G%RIPCK=G%RUCK=BD9D%RUL=G%RUD=G)IE(R=N)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;knows someone howto read or decode nmap fingerprint using for example p0f ?</description>
      <pubDate>Wed, 26 Dec 2007 07:31:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120508#M83346</guid>
      <dc:creator>'chris'</dc:creator>
      <dc:date>2007-12-26T07:31:47Z</dc:date>
    </item>
    <item>
      <title>Re: find out an OS from the remote machine using nmap</title>
      <link>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120509#M83347</link>
      <description>that's because either the host you tried to scan has an OS that is not included yet in the 'database' of nmap,&lt;BR /&gt;or there were not enough ways to contact the host to get enough info to determine the correct OS.&lt;BR /&gt;&lt;BR /&gt;what needs to be done in these cases is that you have to find out another way, and report it to the nmap developers. they will then add this fingerprint to the next release of nmap so it can be recognized from then on.</description>
      <pubDate>Mon, 31 Dec 2007 10:32:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120509#M83347</guid>
      <dc:creator>dirk dierickx</dc:creator>
      <dc:date>2007-12-31T10:32:15Z</dc:date>
    </item>
    <item>
      <title>Re: find out an OS from the remote machine using nmap</title>
      <link>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120510#M83348</link>
      <description>Agree with SEP..&lt;BR /&gt;All: I doubt a single thing...if everyone starts putting the OS fingerprint at the development site and they keep on including it in next releases...somewhere it is defeating the purpose of securing your OS from possible attacks. &lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 01 Jan 2008 10:02:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120510#M83348</guid>
      <dc:creator>Anshumali</dc:creator>
      <dc:date>2008-01-01T10:02:37Z</dc:date>
    </item>
    <item>
      <title>Re: find out an OS from the remote machine using nmap</title>
      <link>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120511#M83349</link>
      <description>security through obscurity doesn't work.&lt;BR /&gt;&lt;BR /&gt;also, it's a tool, can be used for good or bad. if you like to highlight the bad usage that is _your_ way of looking at it.&lt;BR /&gt;&lt;BR /&gt;it is a usefull tool if used for good, and that is where _i_ would like to put the highlight on.&lt;BR /&gt;&lt;BR /&gt;a knife can be used for good or for bad, but for me, a knife is a useful good tool. i'm sure there are people who think knifes are all bad.&lt;BR /&gt;&lt;BR /&gt;if your security measures consist on other parties not knowing which OS you're running, i think you have big problems.</description>
      <pubDate>Tue, 08 Jan 2008 08:02:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120511#M83349</guid>
      <dc:creator>dirk dierickx</dc:creator>
      <dc:date>2008-01-08T08:02:53Z</dc:date>
    </item>
    <item>
      <title>Re: find out an OS from the remote machine using nmap</title>
      <link>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120512#M83350</link>
      <description>my problem is why I should know that is: &lt;BR /&gt;I must programming some ftp and sftp scripts to transfer files to the remote server.&lt;BR /&gt;some of those partners server are outsourced.&lt;BR /&gt;sometimes is very difficult to find out the responsible administrator or they are to busy or due to the security reasons they don't want so quickly answer my questions.</description>
      <pubDate>Wed, 09 Jan 2008 00:46:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/find-out-an-os-from-the-remote-machine-using-nmap/m-p/4120512#M83350</guid>
      <dc:creator>'chris'</dc:creator>
      <dc:date>2008-01-09T00:46:46Z</dc:date>
    </item>
  </channel>
</rss>

