Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-312:Active OS Fingerprinting
Attack Pattern ID:312
Version:v3.9
Attack Pattern Name:Active OS Fingerprinting
Abstraction:Standard
Status:Stable
Likelihood of Attack:Medium
Typical Severity:Low
DetailsContent HistoryRelated WeaknessesReports
▼Description
An adversary engages in activity to detect the operating system or firmware version of a remote target by interrogating a device, server, or platform with a probe designed to solicit behavior that will reveal information about the operating systems or firmware in the environment. Operating System detection is possible because implementations of common protocols (Such as IP or TCP) differ in distinct ways. While the implementation differences are not sufficient to 'break' compatibility with the protocol the differences are detectable because the target will respond in unique ways to specific probing activity that breaks the semantic or logical rules of packet construction for a protocol. Different operating systems will have a unique response to the anomalous input, providing the basis to fingerprint the OS behavior. This type of OS fingerprinting can distinguish between operating system types and versions.
▼Extended Description
▼Alternate Terms
▼Relationships
NatureTypeIDName
ChildOfM224Fingerprinting
ParentOfD317IP ID Sequencing Probe
ParentOfD318IP 'ID' Echoed Byte-Order Probe
ParentOfD319IP (DF) 'Don't Fragment Bit' Echoing Probe
ParentOfD320TCP Timestamp Probe
ParentOfD321TCP Sequence Number Probe
ParentOfD322TCP (ISN) Greatest Common Divisor Probe
ParentOfD323TCP (ISN) Counter Rate Probe
ParentOfD324TCP (ISN) Sequence Predictability Probe
ParentOfD325TCP Congestion Control Flag (ECN) Probe
ParentOfD326TCP Initial Window Size Probe
ParentOfD327TCP Options Probe
ParentOfD328TCP 'RST' Flag Checksum Probe
ParentOfD329ICMP Error Message Quoting Probe
ParentOfD330ICMP Error Message Echoing Integrity Probe
ParentOfD331ICMP IP Total Length Field Probe
ParentOfD332ICMP IP 'ID' Field Error Message Probe
Nature: ChildOf
Type: Meta
ID: 224
Name: Fingerprinting
Nature: ParentOf
Type: Detailed
ID: 317
Name: IP ID Sequencing Probe
Nature: ParentOf
Type: Detailed
ID: 318
Name: IP 'ID' Echoed Byte-Order Probe
Nature: ParentOf
Type: Detailed
ID: 319
Name: IP (DF) 'Don't Fragment Bit' Echoing Probe
Nature: ParentOf
Type: Detailed
ID: 320
Name: TCP Timestamp Probe
Nature: ParentOf
Type: Detailed
ID: 321
Name: TCP Sequence Number Probe
Nature: ParentOf
Type: Detailed
ID: 322
Name: TCP (ISN) Greatest Common Divisor Probe
Nature: ParentOf
Type: Detailed
ID: 323
Name: TCP (ISN) Counter Rate Probe
Nature: ParentOf
Type: Detailed
ID: 324
Name: TCP (ISN) Sequence Predictability Probe
Nature: ParentOf
Type: Detailed
ID: 325
Name: TCP Congestion Control Flag (ECN) Probe
Nature: ParentOf
Type: Detailed
ID: 326
Name: TCP Initial Window Size Probe
Nature: ParentOf
Type: Detailed
ID: 327
Name: TCP Options Probe
Nature: ParentOf
Type: Detailed
ID: 328
Name: TCP 'RST' Flag Checksum Probe
Nature: ParentOf
Type: Detailed
ID: 329
Name: ICMP Error Message Quoting Probe
Nature: ParentOf
Type: Detailed
ID: 330
Name: ICMP Error Message Echoing Integrity Probe
Nature: ParentOf
Type: Detailed
ID: 331
Name: ICMP IP Total Length Field Probe
Nature: ParentOf
Type: Detailed
ID: 332
Name: ICMP IP 'ID' Field Error Message Probe
▼Execution Flow
▼Prerequisites
The ability to monitor and interact with network communications.Access to at least one host, and the privileges to interface with the network interface card.
▼Skills Required
▼Resources Required

Any type of active probing that involves non-standard packet headers requires the use of raw sockets, which is not available on particular operating systems (Microsoft Windows XP SP 2, for example). Raw socket manipulation on Unix/Linux requires root privileges.

A tool capable of sending and receiving packets from a remote system.

▼Indicators
▼Consequences
ScopeLikelihoodImpactNote
ConfidentialityN/ARead DataN/A
ConfidentialityAccess ControlAuthorizationN/AHide ActivitiesN/A
Scope: Confidentiality
Likelihood: N/A
Impact: Read Data
Note: N/A
Scope: Confidentiality, Access Control, Authorization
Likelihood: N/A
Impact: Hide Activities
Note: N/A
▼Mitigations
▼Example Instances
▼Related Weaknesses
IDName
CWE-200Exposure of Sensitive Information to an Unauthorized Actor
ID: CWE-200
Name: Exposure of Sensitive Information to an Unauthorized Actor
▼Taxonomy Mappings
Taxonomy NameEntry IDEntry Name
ATTACK1082System Information Discovery
Taxonomy Name: ATTACK
Entry ID: 1082
Entry Name: System Information Discovery
▼Notes
▼References
Reference ID: REF-33
Title: Hacking Exposed: Network Security Secrets & Solutions
Author: Stuart McClure, Joel Scambray, George Kurtz
Publication:
Publisher:McGraw Hill
Edition:6th Edition
URL:
URL Date:
Day:N/A
Month:N/A
Year:2009
Reference ID: REF-128
Title: RFC793 - Transmission Control Protocol
Author: Defense Advanced Research Projects Agency Information Processing Techniques Office, Information Sciences Institute University of Southern California
Publication:
Publisher:Defense Advanced Research Projects Agency (DARPA)
Edition:
URL:http://www.faqs.org/rfcs/rfc793.html
URL Date:
Day:N/A
Month:09
Year:1981
Reference ID: REF-130
Title: The Art of Port Scanning
Author: Gordon "Fyodor" Lyon
Publication:
Phrack Magazine
Publisher:
Edition:Volume: 7, Issue. 51
URL:http://phrack.org/issues/51/11.html
URL Date:
Day:N/A
Month:N/A
Year:1997
Reference ID: REF-212
Title: Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Author: Gordon "Fyodor" Lyon
Publication:
Publisher:Insecure.com LLC
Edition:3rd "Zero Day" Edition,
URL:
URL Date:
Day:N/A
Month:N/A
Year:2008
Details not found