Write your own TCP/IP stack. But please read all the other replies before you do so.
On Tue, Apr 29, 2008 at 6:30 PM, macintoshzoom <[EMAIL PROTECTED]> wrote: > seen some pf.conf settings against remote OS detection at > http://nmap.org/misc/defeat-nmap-osdetect.html#OPENBSD: > > ""The OpenBSD packet filter can also be configured to try to defeat remote > OS Fingerprint.."" > > and at http://hackepedia.org/?title=Pf : > > "" > # block nmap OS detection scans somewhat (-O) > block in quick proto tcp flags FUP/WEUAPRSF > block in quick proto tcp flags WEUAPRSF/WEUAPRSF > block in quick proto tcp flags SRAFU/WEUAPRSF > block in quick proto tcp flags /WEUAPRSF > block in quick proto tcp flags SR/SR > block in quick proto tcp flags SF/SF > "" > > Any tips for a full pf.conf settings ? > > On Tue, 29 Apr 2008 06:18:38 -0600 > > macintoshzoom <[EMAIL PROTECTED]> wrote: > > > > > How to HIDE "OpenBSD" as user-agent? > > > > For security reasons it is sometimes interesting to hide GLOBALLLY th > > O.S. you are running on AGAINST GIVING ANY CLUE TO HACKERS ABOUT HOW TO > > ATTACK YOU. > > > > Not only browsing but globally. > > > > Thanks for any tip about this.