There are many tools today that are used for remote active operating
system fingerprinting. They all have their own fingerprinting
techniques. This paper gives an in-depth analysis of three such tools:
Nmap, RINGv2, and Xprobe2. The purpose of the paper is to show how
these tools work, and to understand the advantages and disadvantages
they each offer.