上QQ阅读APP看书,第一时间看更新
How it works…
Identifying the operating system running on a remote host could be of great use to any vulnerability scanning or penetration testing process, as this will allow you to differentiate between the applicable vulnerabilities and exploits.