Ep 18. Uncovering Services and Fingerprinting the OS
- April 23, 2017
- 7 min
Learning Network Penetration Testing with Kali Linux is a web series aimed at providing knowledge on the security of computer networks through the use of ethical hacking techniques. Season 1, episode 18, titled "Uncovering Services and Fingerprinting the OS," is an interesting and informative episode that focuses on two important aspects of network security.
The episode begins with an explanation of how network services are installed, run, and used by users. Network services can be defined as programs that run in the background and carry out specific tasks like managing user authentication, data storage, and communication. The show hosts go on to explain how these services can be exploited by attackers to gain access to a network.
Next, the hosts delve into the concept of 'fingerprinting' the OS, which refers to the process of identifying the type and version of an operating system that a network device uses. The hosts explain that by identifying the operating system, attackers can make informed decisions on which vulnerabilities they can exploit; hence fingerprinting an OS becomes a crucial part of network security.
The episode progresses as the hosts showcase various tools and techniques used to uncover services and fingerprint the operating system. The first tool discussed is Nmap, a powerful network mapping tool that can be used to scan for open ports, identify services running on those ports, and even determine the version of the service. The show hosts explain the different types of Nmap scans, such as SYN or Stealth scans, and demonstrate how to use them efficiently.
The next tool discussed is Fping, which is used to check the availability of IP addresses on a network. The show hosts explain how Fping can be used to detect which IP addresses are live, and how it can be useful in detecting hidden or stealthy devices on a network.
The episode goes on to discuss the importance of active and passive fingerprinting, and showcase various tools like OS Fingerprinting, P0F, and Netcat, which can be used to identify the type and version of an OS. The hosts explain how active fingerprinting sends packets to the target and requires the target to respond with information about its OS, while with passive fingerprinting, the target system is not aware that any reconnaissance is taking place.
Towards the end of the episode, the hosts showcase an interesting technique called OSINT (Open Source Intelligence), which involves gathering information about the target system from publicly available sources like social media platforms and online forums.
Overall, "Uncovering Services and Fingerprinting the OS" is an informative episode that demonstrates the use of various tools and techniques to identify services running on a network and fingerprint the OS. The episode is particularly useful for aspiring ethical hackers and cybersecurity enthusiasts who wish to gain an in-depth understanding of network security.