Watch this video on YouTube
What techniques are commonly used by port and vulnerability scanners to identify the services running on a target system?