Which fingerprinting techniques exploits the fact that operating - ProProfs Discuss
Advertisement

Which fingerprinting techniques exploits the fact that operating systems differ in the amount of information that is quoted when ICMP (Internet Control Message Protocol) errors are encountered?

Asked by Fhepler, Last updated: Apr 07, 2024

+ Answer
Request
Question menu
Vote up Vote down

1 Answer

fhepler

fhepler

fhepler
Fhepler

Answered Dec 11, 2018

ICMP (Internet Control Message Protocol) message quoting

ICMP Message quoting: The ICMP quotes back part of the original message with every ICMP error message. Each operating system will quote definite amount of message to the ICMP error messages. The peculiarity in the error messages received from various types of operating systems helps us in identifying the remote hosts OS.
upvote downvote
Reply 

Advertisement
Advertisement
Search for Google images Google Image Icon
Select a recommended image
Upload from your computer Loader
Image Preview
Search for Google images Google Image Icon
Select a recommended image
Upload from your computer Loader
Image Preview
Search for Google images Google Image Icon
Select a recommended image
Upload from your computer Loader

Email Sent
We have sent an email to your address "" with instructions to reset your password.