All Collections
Platform Documentation
Passive OS Spoofing/Fingerprinting
Passive OS Spoofing/Fingerprinting
Sofia Al-Silawi avatar
Written by Sofia Al-Silawi
Updated over a week ago

Passive OS spoofing/fingerprinting is a technique used to determine a remote system's operating system (OS) without actively probing it.Instead of actively sending packets to the target system, passive OS fingerprinting relies on analyzing the characteristics of network traffic generated by the target system, such as TCP/IP stack behavior, packet size, and how packets are fragmented and reassembled.

In simple terms, this technique will allow you to spoof the OS used for all your requests when using the proxies if a different OS is selected rather than the original OS running on the machine.

By default, Linux is the OS used when running the proxies. It can be changed to Windows with a few clicks to spoof the OS.

Starting Proxidize version, this mechanism is introduced to match Windows OS characteristics.

This feature can be enabled from the Proxidize dashboard > Settings tab > Advanced Network Settings

To change it to Windows, you must choose "Windows" from the drop-down list once you click the "Change" button.

Once OS spoofing is enabled, the OS is spoofed to the selected OS for all requests and all proxies. If you have any issues with this feature, you will need to contact the support team via the live chat on the website and give them the details of how you're testing this feature.

Did this answer your question?