I want to evade
nmap‘s TCP/IP fingerprinting, which it uses to detect the OS on a machine. I read A practical approach for defeating Nmap OS-Fingerprinting which explains how this can be done. It also suggests a few programs which can do this. Most of them manipulate the TCP/IP implementation in the kernel. But they’re are all outdated and not maintained anymore.
So I would like to ask if anyone knows another way of achieving this. Can I configure the responses to
nmap‘s os-probing packets manually?