segofensiva / OSfooler-ng

OSfooler-ng prevents remote active/passive OS fingerprinting by tools like nmap or p0f
GNU General Public License v3.0
200 stars 74 forks source link

T option doesn't work. Can't emulate *nix OS #7

Open vaselo opened 4 years ago

vaselo commented 4 years ago

I can't emulate *nix like OS with OSfooler-ng.

osfooler_ng.py -o "FreeBSD" -d "4.7-5.2 (or MacOS X 10.2-10.4) (2)"
osfooler_ng.py -o "Linux" -d "2.6 (newer, 1)"

Handshake doesn't happen. But Windows XP ... Windows 10 work great. Here is a tcp dump collected at the target machine which is a Web server, accepting modified packets.

I see that all the OSes I failed to emulate, have T option set. That seems to be the reason.

Environment:

Please help me with a clue or just check if your setup allows to emulate these OSes.

huangyifei226 commented 2 years ago

I also had the same problem. Did you find the reason?

vaselo commented 2 years ago

Lost interest to this tool If I remember right, it worked on some Linux distros like Centos 6 or so.