spoof OS detection by messing with the tcp stack
Based on security cloak by Craig Heffner: https://web.archive.org/web/20061202015837/http://www.craigheffner.com/security/
./impostor <profile>
profiles are defined in profiles.ini
unfortunately the results are currently far form perfect. will most likely have to play with the window size on linux
windows version
- Continue research and explore advanced methods involing things like spoofed services



