FINDING · DEFENSE

Marionette defeats active fingerprinting by routing non-protocol probes into explicit error-state transitions that respond byte-identically to the target service. Across all 9 evaluated configurations (HTTP, FTP, SSH × nmap 6.4.7, Nessus 6.3.6, Metasploit 4.11.2), every fingerprinting tool reported the Marionette server as the intended target application (Apache 2.4.7, Pure-FTPd 1.0.39, or OpenSSH 6.6.1) while simultaneously passing live Marionette client traffic.

From 2015-dyer-marionetteMarionette: A Programmable Network-Traffic Obfuscation System · §7.5 · 2015 · USENIX Security Symposium

Implications

Tags

techniques
active-probing
defenses
marionette

Extracted by claude-sonnet-4-6 — review before relying.