superswan / impostor

spoof OS detection by messing with the tcp stack

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

impostor

spoof OS detection by messing with the tcp stack

Based on security cloak by Craig Heffner: https://web.archive.org/web/20061202015837/http://www.craigheffner.com/security/

Inspired by: https://nmap.org/book/nmap-defenses-trickery.html#nmap-defenses-os-spoofing

usage

./impostor <profile> profiles are defined in profiles.ini

Screenshots

Linux

Before:

nmap-ubuntu-1.png

After:

nmap-ubuntu-2.png

unfortunately the results are currently far form perfect. will most likely have to play with the window size on linux

Windows

Before:

nmap-windows.png

After:

nmap-windows-2.png

TODO

windows version

  • Continue research and explore advanced methods involing things like spoofed services

About

spoof OS detection by messing with the tcp stack

License:The Unlicense


Languages

Language:C 64.3%Language:Python 35.7%