Host Fingerprinting and Firewalking With hping - This paper discusses some of the techniques that can be effectively used in host fingerprinting, especially when a host is behind a firewall. Various tools are discussed with hping as a primary focus.
4551fc357bc99a5d90e564c450d8eddd4597186a144d53e9b6e875d61830337f