A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Fingerprinting of Host Based Firewalls
unpublished
This work describes new procedures for fingerprinting widely used Windows personal firewalls that are integrated into endpoint security system solutions. In order to represent majority of the market, we chose the most widespread solutions for testing. Free open source tool Nmap was used for this research. All tests were designed in order to be easily repeated. We describe two approaches to personal firewall fingerprinting-port state based and time based. Both approaches exploit various
fatcat:j37trukf6jfzviicebhv2lu4e4