CAPEC-313: Passive OS Fingerprinting

Standard Stable 严重程度: Low 攻击可能性: High

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

An adversary engages in activity to detect the version or type of OS software in a an environment by passively monitoring communication between devices, nodes, or applications. Passive techniques for operating system detection send no actual probes to a target, but monitor network or client-server communication between nodes in order to identify operating systems based on observed behavior as compared to a database of known signatures or values. While passive OS fingerprinting is not usually as reliable as active methods, it is generally better able to evade detection.

前提条件

  • The ability to monitor network communications.Access to at least one host, and the privileges to interface with the network interface card.

所需资源

  • Any tool capable of monitoring network communications, like a packet sniffer (e.g., Wireshark)

后果影响

影响范围: Confidentiality

技术影响: Read Data

影响范围: Confidentiality Access Control Authorization

技术影响: Hide Activities

分类映射

分类名称 条目ID 条目名称
ATTACK 1082 System Information Discovery
关键信息

CAPEC ID: CAPEC-313

抽象级别: Standard

状态: Stable

典型严重程度: Low

攻击可能性: High

相关攻击模式
相关CWE弱点