🤝 Join us on DISCORD 🤝
Name: Adrian Korn
Name: Jaime Sanchez
Traditional methods to defeat OS Fingerprinting in Linux were written as kernel modules, or at least, as patches to the Linux kernel, like Honeyd, IP Personality, the Stealth Patch, Fingerprint ****er, IPlog...The reason is that if the aim is to change Linux TCP/IP stack behavior, and if we want to achieve it, we need to do it in the kernel layer. Most of these tools are old, doesn't work with actual kernels of can affect tcp/ip stack performance.
OSfooler-NG has been complete rewriten from the ground up, being highlyportable, more efficient and combining all known techniques to detectand defeat at the same time:- Active remote OS fingerprinting: like Nmap or Xprobe- Passive remote OS fingeprinting: like p0f or pfsense- Commercial engines like Sourcefire’s FireSiGHT OS fingerprinting
Some features in this versions are:- No need for kernel modification or patches- Simple user interface and several logging features- Transparent for users, internal process and services- Detecting and defeating mode: active, passive & combined- Will emulate any OS- Capable of handling updated nmap and p0f fingerprint database- Undetectable for the attacker"
Name: Robert Sell
Name: MITCHELL PARKER
Name: Richard Gold
Name: Anthony “C01И” Rose and Jake “Hubble” Krasnov
Name: Andreas Georgiou & Jacob Wilkin
Name: Martin Vigo
Name: Chris Kirsch
Name: William Suthers
Name: Utku Sen
Name: Mike Landeck
Name: Jeff Foley (Changing category to Tool Demo)
Name: Alina Dorina
Name: Jason Edison
©2022. Recon Village. All Rights Reserved.