IpMorph: fingerprinting spoofing unificationJournal in computer virology 6, no. 42010
Authors: G. Prigent, F. Vichot, F. Harrouet
Summary: Nowadays, there are a variety of tools for easily identifying the TCP/IP stack's fingerprint of a target machine. IpMorph allows this fingerprint to be concealed, and even mimicks the fingerprint of a chosen TCP/IP stack. This is done through live session tracking and packet rewriting. Its effectiveness against tools such as Nmap, Xprobe2, Ring2, SinFP and p0f is also detailed.