1. BYOSwerx Knowledge Base
  2. BYOS vs Solutions/ Attacks

Fingerprinting Attack

How BYOS and other solutions would defend users from Fingerprinting Attacks.

Attack Description:

Passive collection of configuration attributes from a remote device during standard layer 4 network communications.

 

Screenshot 2023-10-30 at 12.27.57 PM

Expected Result:

The computer with BYOS Software cannot be canned or discovered by an attacker on the same network, whereas the control computer can.

How will BYOS help you?

  • BYOS will ignore fingerprinting requests at the edge. The endpoint will not know anything came their way.

How will a VPN help you?

  • A VPN does not have the ability to prevent/detect/mitigate this attack.

How will an EDR help you?

  • EDRs may have some basic firewall+HIDS functionality, but they will only have limited ability to prevent/detect/mitigate this attack. They also depend on what the endpoint's OS has to say.

How will a SASE help you?

  • SASE may have some basic firewall+HIDS functionality, but they only have a limited ability to prevent/detect/mitigate this attack. They also depend on what the endpoint's OS has the say.