{"id":149,"date":"2008-10-04T21:24:31","date_gmt":"2008-10-05T01:24:31","guid":{"rendered":"http:\/\/blogs.n1zyy.com\/andrew\/?p=149"},"modified":"2008-10-04T21:24:31","modified_gmt":"2008-10-05T01:24:31","slug":"digital-cloaks","status":"publish","type":"post","link":"https:\/\/blogs.n1zyy.com\/andrew\/2008\/10\/04\/digital-cloaks\/","title":{"rendered":"Digital Cloaks"},"content":{"rendered":"<p>Not too long ago, <a href=\"http:\/\/blogs.n1zyy.com\/n1zyy\/\">Matt<\/a> <a href=\"http:\/\/blogs.n1zyy.com\/n1zyy\/2008\/09\/18\/spam-windows-p0f-and-pfs-scrub\/\">talked a bit about p0f<\/a> and it&#8217;s ability to distinguish your operating system based on the packets its sending.<\/p>\n<p>Today, <a href=\"http:\/\/hackaday.com\">Hack a Day<\/a> <a href=\"http:\/\/hackaday.com\/2008\/10\/04\/avoiding-os-fingerprinting-in-windows\/\">highlighted<\/a> a <a href=\"http:\/\/www.irongeek.com\/i.php?page=security\/osfuscate-change-your-windows-os-tcp-ip-fingerprint-to-confuse-p0f-networkminer-ettercap-nmap-and-other-os-detection-tools\">project<\/a> that can help you overcome some of the fingerprinting in p0f (and other tools, like nmap) by emulating the characteristics of other OSs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Not too long ago, Matt talked a bit about p0f and it&#8217;s ability to distinguish your operating system based on the packets its sending. Today, Hack a Day highlighted a project that can help you overcome some of the fingerprinting in p0f (and other tools, like nmap) by emulating the characteristics of other OSs.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,30,32],"tags":[],"class_list":["post-149","post","type-post","status-publish","format-standard","hentry","category-hacks","category-technology","category-tips"],"_links":{"self":[{"href":"https:\/\/blogs.n1zyy.com\/andrew\/wp-json\/wp\/v2\/posts\/149","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.n1zyy.com\/andrew\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.n1zyy.com\/andrew\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.n1zyy.com\/andrew\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.n1zyy.com\/andrew\/wp-json\/wp\/v2\/comments?post=149"}],"version-history":[{"count":0,"href":"https:\/\/blogs.n1zyy.com\/andrew\/wp-json\/wp\/v2\/posts\/149\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.n1zyy.com\/andrew\/wp-json\/wp\/v2\/media?parent=149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.n1zyy.com\/andrew\/wp-json\/wp\/v2\/categories?post=149"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.n1zyy.com\/andrew\/wp-json\/wp\/v2\/tags?post=149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}