Skip to content

Prajwalmithun/OS_Finger_Printing

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 

Repository files navigation

OS_Finger_Printing

This project mainly encompasses on determining the operating system of the specific host. It also determines the prediction percentage of the operating system. It is not only specific to determine the OS but also gives the status of host with opened ports. It is one of the methods under Active Information Gathering under the PTES(ie.,Penetration Testing Execution Standard).

Getting Started

Prerequisite

python-nmap
nmap

Installation

Installing the Prerequisites

Fedora

$ pip install python-nmap
$ sudo yum install nmap

Debian or Ubuntu

$ pip install python-nmap
$ sudo apt-get install nmap

Running

$ git clone https://github.com/Prajwalmithun/OS_Finger_Printing.git
$ cd OS_Finger_Printing
$ sudo python3 scanner.py [ip_address of the host]
$ vi osinfo.txt

This "osinfo.txt" file contains the information about the operating system, ports that are open.

About

OS Finger printing or TCP/IP Stack Finger printing

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy