Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Active & Passive Fingerprinting Microsoft Operating Systems Using ICMP Protocol

Black Hat via YouTube

Overview

Explore active and passive fingerprinting techniques for Microsoft operating systems using the ICMP protocol in this comprehensive Black Hat conference talk. Delve into the intricacies of network reconnaissance as speaker Ofir Arkin demonstrates how to gather valuable information about Windows systems through both proactive and stealthy methods. Learn to leverage the Internet Control Message Protocol (ICMP) for identifying and analyzing Microsoft OS versions, uncovering potential vulnerabilities, and enhancing your understanding of network security. Gain insights into the effectiveness of these fingerprinting techniques and their implications for both offensive and defensive cybersecurity strategies.

Syllabus

Black Hat Windows 2001 - Active & Passive Fingerprinting Microsoft Op. Syst. Using ICMP Protocol

Taught by

Black Hat

Reviews

Start your review of Active & Passive Fingerprinting Microsoft Operating Systems Using ICMP Protocol

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.