Fooling OS fingerprinting?
Suppose you wanted to fool OS fingerprinting tools such as xprobe, nmap, etc. in order to make the initial information gathering phase harder.
In BSD you can use pf's traffic normalization options. Even the Windows world has seen a few tools to make your win* box appear as running a different OS.
In Linux, on the other hand, we had IPpersonality (ippersonality.sourceforge.net), iplog (ojnk.sourceforge.net) and morph (synacklabs.net) but they're quite old now and only work with 2.4 kernels.
So I was wondering if any of you can suggest alternatives? pf for linux anyone?