nmap -O: how OS fingerprinting actually works
I have been using nmap's -O flag for a year and only this week sat down to read how it actually works. The technique is more subtle than I had assumed and the implications for stealth are larger.
Long-form thinking on cyber defence, detection, and resilience — from Slackware-era honeypots through to AI-driven SOC analytics.
Showing posts tagged reconnaissance — 2 results.
I have been using nmap's -O flag for a year and only this week sat down to read how it actually works. The technique is more subtle than I had assumed and the implications for stealth are larger.
Fyodor's nmap has become my single most-used tool when I want to know, with confidence, what is actually on a network. A short walk through what it does and why every defender should run it on their own perimeter regularly.