System Identification
Active OS Fingerprinting
Nmap can scan a system and identify the OS
nmap -O 192.168.1.100
xprobe2 -p tcp:80:open 192.168.1.100
Passive OS Fingerprinting
equires a lot of patience
Objective: Capture TCP packets stealthily
p0f Scan
ARP poisoning attack