May 2017
Intermediate to advanced
634 pages
16h 24m
English
To use the p0f command to perform operating system identification, you will need to have a remote system that is running network services. In the examples provided, an instance of Metasploitable2 is used to perform this task. For more information on setting up Metasploitable2, refer to the Installing Metasploitable2 recipe in Chapter 1, Getting Started.
Read now
Unlock full access