Study on the Technologies of Operating System Scanning

Article Preview

Abstract:

Operating system (OS) scanning makes it possible to focusing further attacks to known weaknesses of that system. The principle of OS scanning is that different OS vendors may make different implementations for the TCP/IP protocol in their OS products. IP, UDP and TCP as well as application layer protocols are can be used for OS scanning. These methods can be used in active ways sending probes to the targets or passive ways only listening without probes. Totally, whether it used in an active or passive way, the essence for OS scanning is analyzing the characteristics of the packets sent by the targets and matching the characteristics with certain operating system. So, in some cases, we need two or more of these methods together to determine the type of the OS for the target.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 989-994)

Pages:

4733-4736

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] N.F. Zhu, Y. Zhou, W. Wei and L. Lou, Analysis on the Technologies of Host and Port Scanning, 2nd International Conference on Computer Software, Data Handling and Applications (CSDHA 2014), April, (2014).

Google Scholar

[2] P. Engebretson, in: The Basics of Hacking and Penetration Testing, Elsevier, Waltham, (2011).

Google Scholar

[3] M.A. Rahman, M.H. Manshaei, E. Al-Shaer, A Game-theoretic Approach for Deceiving Remote Operating System Fingerprinting, 2013 IEEE Conference on Communications and Network Security (CNS), Oct., (2013), P. 73-81.

DOI: 10.1109/cns.2013.6682694

Google Scholar

[4] H. Zhao, Y.Q. Shi, Detecting Covert Channels in Computer Networks Based on Chaos Theory, IEEE Transactions on Information Forensics and Security, 8(2), (2013), P. 273-282.

DOI: 10.1109/tifs.2012.2231861

Google Scholar

[5] G. Gómez, J. Lorca, R. García, and Q. Perez, Towards a QoE-Driven Resource Control in LTE and LTE-A Networks Journal of Computer Networks and Communications, (2013), P. 1-15.

DOI: 10.1155/2013/505910

Google Scholar

[6] J.X. Tao, L. Zhou, Z. Zhou, R. Yang, Defending Against SYN Flood Attack under Asymmetric Routing Environment, International Workshop on Cloud Computing and Information Security, (2013), P. 165-168.

DOI: 10.2991/ccis-13.2013.39

Google Scholar