Identifying the OS used on the target host allows an attacker to figure out the vulnerabilities the system have and the exploits that might work on a system to further perform additional attacks.
Capture the response generated from the target machine using packet-sniffing tools such as Wireshark and watch the TTL and TCP window size.
There are two types of banner grabbing techniques: active and passive.
Banner grabbing or OS fingerprinting is the method to determine the OS running on a remote target system.
| Operating System | Time-to-Live(TTL) | TCP Window Size |
|---|---|---|
| Linux(Kernel 2.4 and 2.6) | 64 | 5840 |
| FreeBSD | 64 | 65535 |
| OpenBSD | 64 | 65535 |
| Google customized Linux | 64 | 5720 |
| Windows XP | 128 | 65535 |
| Windows 7, Vista and Server 2008 | 128 | 8192 |
| Cisco Router IOS 12.4 | 255 | 4128 |

ping -c 10 <Target IP Address[Windows 10]>

TTL value recorded as 64 means that the ICMP request came from a Linux-based machine.

You will repeat the same process, but with the Windows 7 machine. Open the Prompt or Powershell and ping the Windows 10 machine running Wireshark.
ping <Target IP Address>
TTL value recorded as 128 means that the ICMP request came from a Windows-based machine.
