header bg

Scan QR code or get instant email to install app

Question:

One of your team members is analyzing TTL fields and TCP window sizes in order to fingerprint the OS of a target. Which of the following is most likely being attempted?

A Passive OS fingerprinting
explanation

In general, any action stated in a query that does not directly specify you are constructing packets and injecting them into a system shows you are passively observing traffic—most likely using a sniffed traffic log.

Related Information

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *

*