How BYOS and other solutions would defend users from Fingerprinting Attacks.
Attack Description:
Passive collection of configuration attributes from a remote device during standard layer 4 network communications.
Expected Result:
The computer with BYOS Software cannot be canned or discovered by an attacker on the same network, whereas the control computer can.
How will BYOS help you?
- BYOS will ignore fingerprinting requests at the edge. The endpoint will not know anything came their way.
How will a VPN help you?
- A VPN does not have the ability to prevent/detect/mitigate this attack.
How will an EDR help you?
- EDRs may have some basic firewall+HIDS functionality, but they will only have limited ability to prevent/detect/mitigate this attack. They also depend on what the endpoint's OS has to say.
How will a SASE help you?
- SASE may have some basic firewall+HIDS functionality, but they only have a limited ability to prevent/detect/mitigate this attack. They also depend on what the endpoint's OS has the say.