ethical-hacker video for ryan, an attacker, aimed to identify the presence of honeypots within a target network. To achieve this, he utilized a time-based TCP
Ryan, an attacker, aimed to identify the presence of honeypots within a target network. To achieve this, he utilized a time-based TCP fingerprinting method to compare the response of a regular computer to that of a honeypot when subjected to a manual SYN request. Which of the following techniques did Ryan employ to detect honeypots?