Back

Lesson 6: Operating System Detection

Learn to identify target operating systems through fingerprinting

1 / 4

Operating System Detection Basics

OS detection analyzes network responses to determine the operating system running on a target host. This information is crucial for understanding potential attack vectors and system characteristics.

Why OS Detection Matters

Security Applications:
  • Vulnerability Assessment: OS-specific exploits
  • Attack Planning: Tailor attacks to OS type
  • Network Mapping: Understand infrastructure
  • Compliance Checking: Verify authorized systems
  • Asset Management: Inventory OS versions
Information Gathered:
  • • Operating system family (Windows, Linux, etc.)
  • • OS version and build numbers
  • • Device type (desktop, server, mobile, router)
  • • Network stack implementation details
  • • Patch level indicators
Basic OS Detection Command
nmap -O 192.168.1.100
Performs OS detection along with default port scan
Note: Requires root/administrator privileges for raw socket access

Sample OS Detection Output

Starting Nmap 7.94 ( https://nmap.org )
Nmap scan report for 192.168.1.100
Host is up (0.00045s latency).
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
443/tcp open https
Device type: general purpose
Running: Linux 5.X
OS CPE: cpe:/o:linux:linux_kernel:5
OS details: Linux 5.0 - 5.4
Network Distance: 1 hop