In this second part of a five-part article on IP network scanning you will learn about OS fingerprinting using ICMP TCP port scanning and other scanning methods. This article is excerpted from chapter four of em Network Security Assessment Second Edition em written by Chris McNab O Reilly 2 7 ISBN 59651 3 6 . Copyright 2 7 O Reilly Media Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O Reilly Media….
Build IT Knowledge with Current & Trusted Content Helps Employees Develop & Hone New Technical Programming Skills. Sign Up & Get Full Access.

More: continued here