I am trying to log the "Passive Operating System Fingerprinting" of connections inside my PF and I guess I don't know if that's possible. Is it possible to do so?

I have a list of 46K computers that from the logs are all the same OS, patch, etc and I want to get the OSFP of it to see what it might be and if that's the only connection with that specific signature.

The reason I want to do this is that I am still working on my attack that I posted on the list and I did much progress on it.

Many, many interesting things came out of it so far.

Looks like this attack is more interested in drawing huge traffic for the servers, oppose to make it unresponsive. Or may be the setup for the standard DDoS is working plenty well that it doesn't work the standard way and this is a new type. I don't really know for sure at this time.

But for sure this attack doesn't response to redirect, so that's one way to control it so far as legitimate traffic is redirected and bad one is kill and log.

All the bad one always have the same OS log entry, so I wonder if that would have the same OSFP and that's why I want to log it and see.

One thing I don't know is if let say this is from a webbot network, would the signature of the packets coming in would be different when sent from the compromise software on the victims computers and if that connection is coming form the normal browser on the same connection if the signature would be different. I don't know that and I think it would be the same I guess as I don't know much about these webbot stuff. I think it might be possible that the signature would be different as I assume that these software needs to be not detectable from the users, etc. Any thought on this?

In any case, I would love to log the signature if at all possible and the study the results.

Best,

Daniel

Reply via email to