Check out the sample chapter from the New book Stealing the Network: How to Own an Identity. http://www.insecure.org/stc/sti.html Once again from on of the persons from nmap team.
http://i12.photobucket.com/albums/a2...l0ck9/Sig5.gif
Forum Rules