While using nmap for fingerprinting my linux box, i noticed that it sends FP flags for doing that. Is it really possible to fingerprint using corrupted packets?
Do you have some docs on that? Statu Nascendi. ----- Original Message ----- From: "Alain Tesio" <[EMAIL PROTECTED]> To: <[email protected]> Sent: Saturday, October 12, 2002 11:31 AM Subject: Re: Access on Port 0 Packets on port 0 are invalid and like packets with private IPs or bad TCP flags, they can be used for fingerprinting the target system. I don't see any other reason to see a packet on port 0. Alain -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

