This project intends to re-create nmap's tool for OS detection, using the methods described here: https://nmap.org/book/osdetect.html, and the scapy library.
© Shani Rosen 2022
First, clone the project and make sure to have all the requirements with:
pip install -r requirements.txt
Then you can run the program by running:
python os_fingerprint.py [host]
For example:
sudo python os_fingerprint.py nmap.scanme.org
sudo python os_fingerprint.py 45.33.32.156
Note: The program has to run in root privileges!
Param | Extended Version | Purpose |
---|---|---|
-h | - - help | General help |
-f | - - fast | Shortening the amount of ports the program scans, so the result is faster |
-t | - - timeout | Defining the timeout for receiving an answer to a packet. By default 5 seconds. |
-r | - - results | Define the number of top results to show. The default is 10. |
-p | - - ports | Show the result of the port scan. |
-d | - - debug | Debug mode - logs every main function that runs, along with memory usage and duration. |