richrarobi wrote:Does
cat /proc/cpuinfo
give what you want? I use this to tell if a processor is ARM or not - so I don't run pi stuff on my Linux system.
Unnecessary for this purpose (and accepting "pi" as valid user is usually dead giveaway

). I get all I need from the
nmap. For those not familiar, here is an example of the info it gives about each pi found on the system - it is awesome tool for managing a lot of scattered embedded stuff on a local network. This example is from raspberry connected to the network wirelessly through WiPi dongle, so it does not report "Raspberry Pi foundation" with the MAC address, but it is pretty clear that it is the raspbbery behind the IP address.
Code: Select all
Nmap scan report for 192.168.90.133
Host is up (0.0014s latency).
Not shown: 998 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh (protocol 2.0)
|_ssh-hostkey: ERROR: Script execution failed (use -d to debug)
8080/tcp open sip (SIP end point; Status: 404 OK)
|_http-methods: No Allow or Public header in OPTIONS response (status code 200)
|_http-title: UV4L Streaming Server
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port22-TCP:V=6.40%I=7%D=1/27%Time=588B1D08%P=x86_64-redhat-linux-gnu%r(
SF:NULL,22,"SSH-2\.0-OpenSSH_6\.7p1\x20Raspbian-5\r\n");
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
(many lines deleted here)
MAC Address: 00:0F:13:40:1D:D7 (Nisca)
No exact OS matches for host (If you know what OS is running on it, see http://nmap.org/submit/ ).
TCP/IP fingerprint:
(deleted)
So, as you can see, no, you don't need to actually log into the device to get a lot of information (and by extension, a malicious attacker can, too).
Beware. Oh, if anyone can deduce the model of the Pi from the above info, that would be cool, as well, but I think that is not possible.