Fpf kernel module by |CyRaX| [[EMAIL PROTECTED]] (www.pkcrew.org) alters linux tcp/ip 
stack to emulate other OS'es against nmap/queso fingerprints using parser by FuSyS 
that reads nmap-os-fingerprints 
for os emulation choice.

However, attempts to send fragmented packets to local or remote machine with nmap (-sS 
-f, -sN -f, -sX -f, -sF -f, -sA -f) or hping (hping -f) using host with loaded fpf.o 
lead to kernel panic ("Aiee, killing interrupt handle. Kernel panic: Attempted to kill 
the idle task ! In interrupt handler - not syncing.") if run from console or force 
immediate reboot if the packet sending tool is run from an xterm. When fpf.o - running 
machine recieves nmap / hping fragmented packets from remote hosts system freezes.

Security through obscurity was never a pefect solution, but in the current case there 
is also a hefty price to pay: complete inability of tcp/ip stack of "obscured" machine 
to deal with packet fragmentation.

Tested on Slackware 7.1 kernel 2.2.16 (i386).

Regards,

      _clf3_                               ([EMAIL PROTECTED])
     
      Veneficio, ergo sum.



   



------------------------------------------------------------
Email account furnished courtesy of AntiOnline - http://www.AntiOnline.com
AntiOnline - The Internet's Information Security Super Center!

Reply via email to