Fingerprinting

Sat, Dec 25, 2010, by awesome11

Web Talk

A spiteful computer attacker needs some pieces of information before launching an attack. First, an intention, a host detected using a host finding method.

A spiteful computer attacker needs some pieces of information before launching an attack. First, an intention, a host detected using a host finding method. The next part of information would be the services that are running on that congregation. This would be completed with one of the Port Scanning methods.

The final piece of information would be the operating structure used by the host. This information can permit the malicious computer attacker to recognize if the targeted host is weak to a certain exploit aimed at a convinced service version running on a certain operating system.

The art which is used to detect the operating system of target is known as fingerprinting. This method is used very wisely and effectively by the computer hacker.

8
Liked it
35 Comments For This Post
  1. Suni51 Says:

    Very useful for protection purpose.

  2. aimsteel Says:

    Very High tech. Thanks!

  3. ur guide Says:

    very high tech info…….thanks for sharing.

  4. shobhana Says:

    Thanks for the info

  5. lxdollarsxl Says:

    often wondered how they did it – thanks for explaining

  6. strategy03 Says:

    Nice write. I am impressed from this

  7. Geny Says:

    Thanks for sharing..

  8. mailman Says:

    Interesting information.

  9. clandestinef Says:

    Great work. Thanks for sharing this one…

  10. lapasan Says:

    This is the first time that I’ve ever known of this. Thanks for the info.

  11. LCM Linda Says:

    Learn new things. Nice share.

  12. SharifaMcFarlane Says:

    They investigate before an attack.

  13. snowdoll487 Says:

    Quite techy for my style. @_@ Too techie I couldn\’t understand it all in all. @_@

  14. Aizarphilia Says:

    Rather technical, but very interesting!

  15. LadyElena Says:

    Interesting read.

  16. nz2rdfox Says:

    This scared the heck out of me!!! but with unscrupulous minded people just around the bend this is way too much possible.

    valuable share here :)

  17. AdMan Says:

    thats a quite high-techy…

  18. SowmyaT Says:

    Thanks for sharing.

  19. pavlicdyshko Says:

    crazy stuff this why i use wireless mouses

  20. Freethinking Says:

    I am sure many know what you are referring to but I must confess….I am lost.

  21. TaylermnHill Says:

    thanx for the share, i just learned something new.

  22. Merve Baran Says:

    Beautiful photographs!Enjoyed viewing each one of them.Let more of such photos be shot and shown to the general public so that let them too be inspired save Mother Earth!!
    kelebek
    cinsel sohbet
    chat
    arkadaslik sitesi

  23. YNK Says:

    Thanks for sharing this!

    I made $8.34 with the basic membership in wordlinx.
    wordlinx pay 1 cent per click.. if U are interested

    Just sign up this link under my referral.
    http://wordlinx.com/?r=102716

    thanks.

  24. Geny Says:

    Thanks for sharing

  25. rafihan Says:

    very informative…. i like it…

Leave a Reply
comments powered by Disqus