OS Fingerprinting is the process of determining the operating system running on a target host. Nmap achieves this by analyzing how the target responds to crafted network packets and comparing those responses against a database of known behaviors. This feature is helpful for system administrators, penetration testers, and network engineers to understand the environment of a target machine.
Nmap sends a series of TCP, UDP, and ICMP packets to the target and examines responses such as:
These characteristics are unique to specific operating systems, enabling Nmap to infer the OS of the target host. The responses are matched against Nmap’s OS signature database, which contains hundreds of known OS patterns.
The -O option enables Nmap’s OS detection feature. Here’s the syntax: nmap -O [target]
Example: Scan a host to detect its operating system: nmap -O [scanme.nmap.org](<http://scanme.nmap.org>)
Starting Nmap 7.94SVN ( <https://nmap.org> ) at 2024-12-16 16:11 IST
Nmap scan report for scanme.nmap.org (45.33.32.156)
Host is up (0.23s latency).
Other addresses for scanme.nmap.org (not scanned): 2600:3c01::f03c:91ff:fe18:bb2f
Not shown: 993 closed tcp ports (reset)
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds
1434/tcp filtered ms-sql-m
9929/tcp open nping-echo
31337/tcp open Elite
Aggressive OS guesses: Linux 5.0 - 5.4 (95%), Linux 5.0 (95%), HP P2000 G3 NAS device (93%), Linux 4.15 - 5.8 (93%), Linux 5.3 - 5.4 (93%), Linux 2.6.32 (92%), Linux 2.6.32 - 3.1 (92%), Linux 3.7 (92%), Linux 5.0 - 5.5 (92%), Linux 5.1 (92%)
No exact OS matches for host (test conditions non-ideal).
Network Distance: 19 hops
OS detection performed. Please report any incorrect results at <https://nmap.org/submit/> .
Nmap done: 1 IP address (1 host up) scanned in 27.37 seconds