Host Fingerprinting and Firewalking With hping – This paper discusses some of the techniques that can be effectively used in host fingerprinting, especially when a host is behind a firewall. Various tools are discussed with hping as a primary focus.
You can download it from the following link: https://packetstormsecurity.com/files/download/41911/HostFingerprinting.pdf
Source: https://packetstormsecurity.com/files/41911/Host-Fingerprinting-and-Firewalking-With-Hping.html

