Solved

Find Remote OS Type

Posted on 2012-03-21
4
499 Views
Last Modified: 2013-11-29
I’m noticing two machines that have been assigned addresses via DHCP with neither device displaying its name.  Obviously, neither is listed in DNS.

One of these machines has attacked another computer on the subnet according to a recent alert.

I only have the MAC addresses to go on at this point.

Before going to the switch and tracking them down…

Is there a good, free utility that I can run against the IP addresses to find the OS type or other additional information of these machines?
0
Comment
Question by:acmi
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 12

Expert Comment

by:ibrahim52
ID: 37747546
Give it a try.

Referred Link :
http://www.colasoft.com/capsa/features.php
0
 
LVL 12

Accepted Solution

by:
ibrahim52 earned 500 total points
ID: 37747579
0
 
LVL 26

Expert Comment

by:Thomas Zucker-Scharff
ID: 37747866
Luser does what you ask.  Download at http://www.safetoland.com/pctools.html
0
 

Author Closing Comment

by:acmi
ID: 37748229
Perfect - thank you.
0

Featured Post

On Demand Webinar - Networking for the Cloud Era

This webinar discusses:
-Common barriers companies experience when moving to the cloud
-How SD-WAN changes the way we look at networks
-Best practices customers should employ moving forward with cloud migration
-What happens behind the scenes of SteelConnect’s one-click button

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article was originally published on Monitis Blog, you can check it here .   Some years back, I worked as the CTO.  During my tenure, I had a head of IT support reporting to me.  He did his job quite well and had a commendable sense of duty …
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

742 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question