Fool OS Scans functionality #267
Replies: 4 comments 7 replies
-
Hi @citnadxela, Hiding or fooling the fingerprinting process is totally possible (we do it in our commercial Canary product). The issue with OpenCanary is that we do not know what hardware or underlying OS will be running the OpenCanary program (or what combination of the two). So we haven't (yet), endeavoured to add that functionality to the OpenCanary project. |
Beta Was this translation helpful? Give feedback.
-
Hi @jayjb, Thx |
Beta Was this translation helpful? Give feedback.
-
Funny I discover this now, because I actually managed to get what you're trying to do working with a tool called Cyder , fooling the OS scan into thinking my Ubuntu system actually being a Windows Server. It basically returns fingerprint information from the nmap database as a reply on an incoming NMAP scan. It runs fine alongside OpenCanary when you remove the honeypot functionality from Cyder's code (there should be branch available on my account) It runs on outdated Python libraries though, and it's not tested on anything but Ubuntu. If my coding skills were better I would've tried building it into OpenCanary, but maybe someone else is interested into updating the original code and incorporating it ^^ It would be a pretty major add-on, considering Cyder is the only open-source tool capable of this as far as I know. |
Beta Was this translation helpful? Give feedback.
-
I would also like to see this. I tried Cyder, but I can't seem to get it running on Ubuntu 22.04. Not much use in emulating a Windows Server if you can't actually appear to be a Windows Server. |
Beta Was this translation helpful? Give feedback.
-
Opencanary is ran on linux obviously. I was wondering if there's a way to hide the os (in bold below) from the fingerprinting port scan?
PS C:\Users> & 'C:\Program Files (x86)\Nmap\nmap.exe' -O -p 1433 opencanary
Starting Nmap 7.80 ( https://nmap.org ) at 2020-12-11 09:06 Pacific Standard Time
Nmap scan report for opencanary ()
Host is up (0.034s latency).
PORT STATE SERVICE
1433/tcp open ms-sql-s
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose|firewall|WAP
Running (JUST GUESSING): Linux 3.X|4.X|2.6.X|2.4.X (90%), WatchGuard Fireware 11.X (86%), IPFire 2.X (86%)
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:2.6 cpe:/o:watchguard:fireware:11.8 cpe:/o:linux:linux_kernel:2.6.32 cpe:/o:ipfire:ipfire:2.11 cpe:/o:linux:linux_kernel:2.4
Aggressive OS guesses: Linux 3.11 - 4.1 (90%), Linux 3.2.0 (90%), Linux 3.16 (89%), Linux 4.4 (89%), Linux 2.6.18 - 2.6.22 (88%), Linux 3.13 (88%), Linux 3.10 - 3.12 (87%), Linux 3.10 - 4.11 (87%), Linux 3.12 (87%), Linux 3.13 or 4.2 (87%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 6 hops
OS detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 5.96 seconds
PS C:\Users>
Beta Was this translation helpful? Give feedback.
All reactions