Skip to content

Conversation

ultimatecoder
Copy link
Owner

JS-Recon was a tool developed by Andlabs proving the vulnerability of
fingerprinting active TCP ports at client workstation. Unfortunately
that tool is not available. This blog post describes my analysis of
success of that method in present condition and share tool developed by
me for non-developer mass.

@ultimatecoder ultimatecoder force-pushed the master-blog-post-finger-print-open-tcp-ports-client branch from 307ab7f to 9db350b Compare April 23, 2019 13:23
JS-Recon was a tool developed by Andlabs proving the vulnerability of
fingerprinting active TCP ports at client workstation. Unfortunately
that tool is not available. This blog post describes my analysis of
success of that method in present condition and share tool developed by
me for non-developer mass.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants