Check out the sample chapter from the New book Stealing the Network: How to Own an Identity.

http://www.insecure.org/stc/sti.html

Once again from on of the persons from nmap team.