TCP fingerprinting, also known as TCP stack fingerprinting, is the analysis of data fields in a TCP/IP packet to identify the various configuration attributes of a networked device. The information learned from a TCP fingerprint includes the type of device the packet originated from and the operating system it is running. Programs that perform TCP fingerprinting include the network tool nmap.
Packet fields commonly used in TCP fingerprinting
The following table is a list of each TCP field name and size.
Network terms, Packet