How it works…

Identifying the operating system running on a remote host could be of great use to any vulnerability scanning or penetration testing process, as this will allow you to differentiate between the applicable vulnerabilities and exploits.