Haha ~ Hello everyone, I'm bytes (don't call me an idiot )..
Today I will introduce you to the remote host operating system using the ping command.
Understanding the operating system used by the other party is the first step in the attack, because only when you know the system used by the other party can you determine which vulnerabilities the other party may have (but now you can use a scanner ~ ^! ^). Let's get down to the truth ..
For example:
Pinging www.jpena.com [207.235.25.7] with 32 bytes of data:
Reply from 207.235.25.7: bytes = 32 time = 640 Ms TTL = 107 ---> useful!
Reply from 207.235.25.7: bytes = 32 time = 477 Ms TTL = 107
Request timed out.
Reply from 207.235.25.7: bytes = 32 time = 469 Ms TTL = 107
Ping statistics for 207.235.25.7:
Packets: Sent = 4, stored ED = 3, lost = 1 (25% loss ),
Approximate round trip times in Milli-seconds:
Minimum = 469 ms, maximum = 640 ms, average = 396 Ms
In this section, only the value of TTL is useful. TTL is the value of the other operating system.
The following lists some common operating system comparison values.
Win2000 ----> 108
Winnt -------> 107
Win9x ------> 128 or 127
Solaris ----> 252
IRIX -------> 240
AIX -------> 247
Linux -----> 241 or 240
Other users can find out ........
Finished ~ The next step is ...... My flash ~~~~
Bytes