{"id":11036,"date":"2023-01-30T10:01:54","date_gmt":"2023-01-30T09:01:54","guid":{"rendered":"https:\/\/immune.institute\/?p=11036"},"modified":"2023-01-30T10:01:54","modified_gmt":"2023-01-30T09:01:54","slug":"que-es-fingerprinting-para-que-se-utiliza","status":"publish","type":"post","link":"https:\/\/immune.institute\/en\/blog\/que-es-fingerprinting-para-que-se-utiliza\/","title":{"rendered":"Fingerprinting: identifies devices through ports and software versions"},"content":{"rendered":"<p class=\"wp-block-paragraph\"><strong>\u00c1lvaro N\u00fa\u00f1ez.<\/strong> <em>Security Researcher at Telef\u00f3nica Digital, and lecturer in the Master's Degree in Online Cybersecurity at IMMUNE Technology Institute.<\/em> <\/p>\n\n\n\n<p class=\"wp-block-paragraph\">\u00abFingerprinting: identificando dispositivos a trav\u00e9s de puertos y versiones de software\u00bb, fue el t\u00edtulo del seminario web realizado hace unos d\u00edas con el objetivo de conocer esta t\u00e9cnica utilizada para identificar y caracterizar sistemas y <strong>devices connected to a network<\/strong>. This is based on collecting different information about the system or device, and analysing the results in search of open ports, versions of running services, used protocols...<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">It would be possible to make different <strong>techniques<\/strong> based on the system to be explored, for example:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Port scanning: <\/strong>is used to identify which ports of a system are open and accessible through the network. This technique is based on sending requests to different ports on the device and analysing the responses received.<\/li><li><strong>Version scanning:<\/strong> extends the port scan information to find out what type of service is behind it, as well as its version. With this information it is possible to search for known vulnerabilities in these service versions.<\/li><li><strong>Search for the operating system:<\/strong> It is also possible to find out which operating system is behind a machine. This can be done by analysing the services found using the techniques mentioned above, or by analysing network traffic and examining the protocols used.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Fingerprinting tools<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The following techniques can be used to carry out these techniques <a href=\"https:\/\/www.aepd.es\/sites\/default\/files\/2019-09\/estudio-fingerprinting-huella-digital.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">tools<\/a> known in the field of <strong>IT security<\/strong>. During the webinar, some well known ones were used, such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Nmap: <\/strong>is a network scanner of <strong>open source<\/strong> very popular used to discover devices connected to a network, determine their IP addresses, open ports, running services and other details. It is compatible with a wide variety of operating systems, including Windows, Linux and macOS. It also has a graphical user interface (GUI) to enhance the visualisation of results. With Nmap it is possible to perform <strong>port scanning <\/strong>and versions, as well as the detection of the operating system in a simple and effective way.<\/li><li><strong>Wireshark: <\/strong>is a very popular open source network protocol analyser, compatible with various operating systems such as Windows, Linux and macoS. It is used to capture and analyse <strong>network traffic <\/strong>in real time, allowing users to view details of every packet travelling across a network. Among other features, Wireshark detects multiple network protocols and allows users to create filters to view only the packets they are interested in. It is a tool widely used by computer security professionals as well as network administrators and developers to detect network problems, debug applications and protocols, and to better understand how a network works. In addition, it is also used to analyse and detect <strong>security problems<\/strong>Wireshark can be used to detect and detect attacks such as denial of service (DoS) attacks, intrusions, and more. Wireshark has an easy-to-use graphical user interface (GUI), but can also be used at the command line.<\/li><\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">It is important to mention that the <strong>fingerprinting<\/strong> should be done only with authorisation and only on internal networks for security purposes.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">I hope you enjoy the webinar!<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"Masterclass : Fingerprinting with \u00c1lvaro Nu\u00f1\u00e9z\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/hRbeREn5bNY?start=36&#038;feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">If you are interested in <strong>cybersecurity<\/strong>If you are looking for training and you want to specialise in the sector, take a look at our <a href=\"https:\/\/immune.institute\/en\/programas\/master-online-de-ciberseguridad\/\" target=\"_blank\" rel=\"noreferrer noopener\">Master's Degree in Cybersecurity Online<\/a> or to the <a href=\"https:\/\/immune.institute\/en\/programas\/bootcamp-en-ciberseguridad\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity Bootcamp<\/a> y <strong>fill in the form for more information<\/strong>.<\/p>\n\n\n\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2.js\"><\/script>\n<script>\n  hbspt.forms.create({\n    region: \"na1\",\n    portalId: \"6604339\",\n    formId: \"f1916fdf-4d92-44f0-9d0a-ada8ad8b4ea9\"\n  });\n<\/script>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>","protected":false},"excerpt":{"rendered":"<p>\u00c1lvaro N\u00fa\u00f1ez. Security Researcher en Telef\u00f3nica Digital, y docente en el M\u00e1ster de Ciberseguridad Online en IMMUNE Technology Institute. \u00abFingerprinting: identificando dispositivos a trav\u00e9s de puertos y versiones de software\u00bb, fue el t\u00edtulo del seminario web realizado hace unos d\u00edas con el objetivo de conocer esta t\u00e9cnica utilizada para identificar y caracterizar sistemas y dispositivos [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":11038,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","footnotes":""},"categories":[1],"tags":[74,139,140,83,84,141,142],"class_list":["post-11036","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-ciberseguridad","tag-fingerprinting","tag-informatica","tag-seguridad-cibernetica","tag-seguridad-informatica","tag-sistema","tag-software"],"acf":[],"_links":{"self":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts\/11036","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/comments?post=11036"}],"version-history":[{"count":0,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/posts\/11036\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media\/11038"}],"wp:attachment":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media?parent=11036"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/categories?post=11036"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/tags?post=11036"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}