Register
14:57
Stop
CEH - Scanning Networks - OS Discovery (Banner Grabbing/OS Fingerprinting)
Expert
1/15
As a security consultant, you have been hired to conduct a network assessment for a company. The security team needs to understand what operating systems are running on their network devices for vulnerability management. You execute a command and receive the following output: TCP ISN Sequence Analysis: Class=random positive increments Difficulty=3651714 (Good luck!) TCP Options: MSS=1460 SACK=Y Timestamp=Y NOP WS=128 T1(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AS%Ops=MNNTNNW) T2(Resp=N) T3(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AS%Ops=MNNTNNW) T4(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=) T5(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=) T6(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=) T7(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=) OS: Linux 5.4.0-89-generic Which approach is represented by this output for effective OS identification?
a.
DNS-based operating system discovery through zone transfers
b.
OS identification through comprehensive port scanning and service enumeration with timestamp correlation techniques
c.
Passive banner grabbing from application layer responses
d.
Active OS fingerprinting using TCP/IP stack behavior analysis
Expert