Skip to main content

SinFP, unification of active and passive operating system fingerprinting


The ubiquity of firewalls using Network Address Translation and Port Address Translation (NAT/PAT), stateful inspection, and packet normalization technologies is taking its toll on today’s approaches to operating system fingerprinting. Hence, SinFP was developed attempting to address the limitations of current tools. SinFP implements new methods, like the usage of signatures acquired by active fingerprinting when performing passive fingerprinting. Furthermore, SinFP is the first tool to perform operating system fingerprinting on IPv6 (both active and passive modes). Thanks to its signature matching algorithm, it is almost superfluous to add new signatures to its current database. In addition, its heuristic matching algorithm makes it highly resilient against signatures that have been modified by intermediate routing and/or filtering devices in-between, and against TCP/IP customization methods. This document presents an in-depth explanation of techniques implemented by SinFP tool.

This is a preview of subscription content, access via your institution.


  1. 1

    Net::SinFP 0.92.

  2. 2

    Stateful Passive Fingerprinting for Malicious Packet Identification.

  3. 3

    IPv6 Neighbor Discovery Protocol based OS Fingerprinting.

  4. 4

    A Hybrid Approach to Operating System Discovery using Answer Set Programming.

  5. 5

    Toward Undetected Operating System Fingerprinting.

  6. 6

    Prise d’empreinte active des systèmes d’exploitation.

  7. 7

    Internet Protocol (version 6).

  8. 8

    Internet Protocol (version 4).

  9. 9

    SQLite Home Page.

  10. 10

    Transmission Control Protocol.

  11. 11

    Remote OS Detection using TCP/IP Fingerprinting (2nd Generation).

  12. 12

    sinfp—News about SinFP.

  13. 13

    Analyse fine: bornes inférieures et algorithmes de calculs d’intersection pour moteurs de recherche.

  14. 14

    Nmap—Free Security Scanner for Network Exploration and Security Audits.

  15. 15

    TCP/IP Fingerprinting Methods Supported by Nmap.

  16. 16

    Net::SinFP 2.06.

  17. 17

    SinFP vs Nmap.

  18. 18

    Nmap vs SinFP.

  19. 19

    Introduction and Comparison with Nmap 4.10, Part I.

  20. 20

    Comparison with Nmap 4.20, Part II.

  21. 21

    Tips and Tricks.

  22. 22

    SinFP OS fingerprinting tool.

Download references

Author information



Corresponding author

Correspondence to Patrice Auffret.

Rights and permissions

Reprints and Permissions

About this article

Cite this article

Auffret, P. SinFP, unification of active and passive operating system fingerprinting. J Comput Virol 6, 197–205 (2010).

Download citation


  • Command Line
  • Passive Mode
  • Signature Database
  • Network Address Translation
  • Response Frame