Write your own TCP/IP stack. But please read all the other replies
before you do so.

On Tue, Apr 29, 2008 at 6:30 PM, macintoshzoom
<[EMAIL PROTECTED]> wrote:
> seen some pf.conf settings against remote OS detection at 
> http://nmap.org/misc/defeat-nmap-osdetect.html#OPENBSD:
>
>  ""The OpenBSD packet filter can also be configured to try to defeat remote 
> OS Fingerprint..""
>
>  and  at http://hackepedia.org/?title=Pf :
>
>  ""
>  # block nmap OS detection scans somewhat (-O)
>  block in quick proto tcp flags FUP/WEUAPRSF
>  block in quick proto tcp flags WEUAPRSF/WEUAPRSF
>  block in quick proto tcp flags SRAFU/WEUAPRSF
>  block in quick proto tcp flags /WEUAPRSF
>  block in quick proto tcp flags SR/SR
>  block in quick proto tcp flags SF/SF
>  ""
>
>  Any tips for a full pf.conf settings ?
>
>  On Tue, 29 Apr 2008 06:18:38 -0600
>
> macintoshzoom <[EMAIL PROTECTED]> wrote:
>
>
>
> > How to HIDE "OpenBSD" as user-agent?
>  >
>  > For security reasons it is sometimes interesting to hide GLOBALLLY th
>  > O.S. you are running on AGAINST GIVING ANY CLUE TO HACKERS ABOUT HOW TO
>  > ATTACK YOU.
>  >
>  > Not only browsing but globally.
>  >
>  > Thanks for any tip about this.

Reply via email to