Results 1 to 6 of 6

Thread: How does a hacker identify a operating system

  1. #1
    Join Date
    Nov 2009
    Posts
    52

    How does a hacker identify a operating system

    It is quite common now that if you do implement protection application on your computer then definitely your computer will get hacked. But one thing confuses me always that along internet there are tons of computers working. How does a hacker identify which operating system I am using and sent threats related to that. Does this is a bug.

  2. #2
    Join Date
    Apr 2008
    Posts
    3,424

    Re: How does a hacker identify a operating system

    The attacker has a variety of method in doing this type of recognition. Frequently, operating system recognition is performed during the preliminary phase of an attack; throughout this phase, the attacker will typically endeavour to map susceptible points of your systems security arrangement, recognize the open ports all the way through port scanning – and this information in sequence will later be used to recognize probable vulnerabilities on your system, by identifying services working on your system and their versions.

  3. #3
    Join Date
    May 2008
    Posts
    3,516

    Re: How does a hacker identify a operating system

    The operating system on your system is presently running can be distinguished with simplicity, unless you are working a firewall that permits no network packets to arrive at your system. Otherwise, by relating to a variety of ports that might presently be opened on your system (for illustration ports like TCP 21 FTP, TCP 23 TELNET, TCP 25 SMTP, TCP 80 HTTP, TCP 110 POP3) the attacker would locate simple to recognize your operating system through unambiguous protocol analysis.

  4. #4
    Join Date
    Apr 2008
    Posts
    3,339

    Re: How does a hacker identify a operating system

    Generally the mail servers utilize to welcome the client with a greeting – this type of greeting and previous headers are sent back to the attacker without verification essential, and in several cases they include the name of the submission assigned to the operation service that is being queried, and its description, and consequently it is particularly simple to remotely recognize your operating system in this fashion through basically establishing what would be the operating system that the detected service submission is operating on.

  5. #5
    Join Date
    Jan 2006
    Posts
    4,221

    Re: How does a hacker identify a operating system

    Formerly the operating system has been recognized productively, and a map of open ports and previous sanctuary problems has been twisted, the attacker can be in motion along at finding and exploiting sanctuary holes in your system. It is therefore significant to identify with that remote recognition of operating system is hazardous, even though simple to execute – not by it but for what comes subsequently. And there is no sanctuary prevention measure that we can utilize in all cases with 100% results.

  6. #6
    Join Date
    Jan 2006
    Posts
    3,792

    Re: How does a hacker identify a operating system

    The most excellent method to protect this kind of information in sequence is the leakage is to run a robust firewall and to utilize conciliator servers – but once again these are methods of making it additional complicated for the attacker (which at times pays off) but it does not essentially guarantee that you are prevented, knowing that there are even other additional superior methods of identifying operating system which is working on your system, like TCP-IP stack fingerprinting for illustration, that a well trained attacker can utilize and still achieve the necessary information regarding your system and its operating system.

Similar Threads

  1. Replies: 2
    Last Post: 30-03-2012, 07:27 AM
  2. Replies: 9
    Last Post: 03-01-2012, 07:40 AM
  3. Gentoo operating system vs Debian operating system.
    By DEWITT in forum Operating Systems
    Replies: 4
    Last Post: 05-01-2010, 12:49 AM
  4. Identify the faulty component of the system's instability
    By Wguy2008 in forum Operating Systems
    Replies: 5
    Last Post: 20-03-2009, 06:08 PM
  5. Product Key... how to identify in system?
    By Arlo1 in forum Windows XP Support
    Replies: 4
    Last Post: 28-03-2007, 10:37 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,749,890,838.06870 seconds with 16 queries