John, a black hat hacker, wants to find out eccouncil video

 ·  PT1H46M27S  ·  EN

ethical-hacker video for john, a black hat hacker, wants to find out if there are honeypots in the system that he will attack. For this purpose, he will use a

Full Certification Question

John, a black hat hacker, wants to find out if there are honeypots in the system that he will attack. For this purpose, he will use a time-based TCP fingerprinting method to validate the response to a computer and the response of a honeypot to a manual SYN request. Identify which of the following techniques will John use?