Identifying the OS used on the target host allows an attacker to figure out the vulnerabilities the system have and the exploits that might work on a system to further perform additional attacks.
Capture the response generated from the target machine using packet-sniffing tools such as Wireshark and watch the TTL and TCP window size.
There are two types of banner grabbing techniques: active and passive.
Banner grabbing or OS fingerprinting is the method to determine the OS running on a remote target system.
Operating System | Time-to-Live(TTL) | TCP Window Size |
---|---|---|
Linux(Kernel 2.4 and 2.6) | 64 | 5840 |
FreeBSD | 64 | 65535 |
OpenBSD | 64 | 65535 |
Google customized Linux | 64 | 5720 |
Windows XP | 128 | 65535 |
Windows 7, Vista and Server 2008 | 128 | 8192 |
Cisco Router IOS 12.4 | 255 | 4128 |
ping -c 10 <Target IP Address[Windows 10]>
TTL value recorded as 64
means that the ICMP request came from a Linux-based machine.
You will repeat the same process, but with the Windows 7 machine. Open the Prompt or Powershell and ping the Windows 10 machine running Wireshark.
ping <Target IP Address>
TTL value recorded as 128
means that the ICMP request came from a Windows-based machine.