How to defeat NMAP’s TCP/IP fingerprinting method for OS-detection

I want to evade nmap‘s TCP/IP fingerprinting, which it uses to detect the OS on a machine. I read A practical approach for defeating Nmap OS-Fingerprinting which explains how this can be done. It also suggests a few programs which can do this. Most of them manipulate the TCP/IP implementation in the kernel. But they’re are all outdated and not maintained anymore.

So I would like to ask if anyone knows another way of achieving this. Can I configure the responses to nmap‘s os-probing packets manually?

Related:


Leave a Reply