nmap -O: how OS fingerprinting actually works
I have been using nmap's -O flag for a year and only this week sat down to read how it actually works. The technique is more subtle than I had assumed and the implications for stealth are larger.
Long-form thinking on cyber defence, detection, and resilience — from Slackware-era honeypots through to AI-driven SOC analytics.
Showing posts tagged tcp/ip — 1 result.
I have been using nmap's -O flag for a year and only this week sat down to read how it actually works. The technique is more subtle than I had assumed and the implications for stealth are larger.