Prathap,
I have been fooling around with the iptables on my Slackware Linux box,
and when I set it to DENY inbound and forward traffic, and ACCEPT all
outbound traffic, I could not portscan my computer. There are some
issues with this, though. ping does not work, so you would have to
explicitl
It is generally not good to change the OS parameters. If its detectable,
let it be. Best thing to do is to unplug all the holes on regular basis
and configure your firewall to work at its optimum.
Leo
Ethan wrote:
There was just a thread about this on the honeypot mailling list
([EMAIL PROTECT
There have been numerous kernel patches that prevent stealth, fin and rst
scans for Linux and BSD. I'm not sure as to updates, but you can the old
sources for linux kernel 2.4.16 and BSD 4.4 in the downloads section of
www.badc0ded.com.
Applying this code to the latest kernel builds should not
There was just a thread about this on the honeypot mailling list
([EMAIL PROTECTED]). Not only can you make the OS undetectable,
you can also fake other OS's in the nmap scan. Links from honeypot threads:
http://ippersonality.sourceforge.net/
http://www.raisdorf.net/projects/pfprintd/
you also
On Fri, Feb 07, 2003 at 08:13:43PM +0530, Prathap R wrote:
> i just used nmap to detect the os on the network. out of
>curiosity,i want to know if there is a way of making the OS
>undetectable. it will be of great help if anyone could point out how
>do it?. i am using both windows and linu