This document outlines a network with two systems - a Kali Linux attacker system at 10.0.0.2/24 and a Windows XP victim system at 10.0.0.3/24. It indicates the attacker will perform operating system fingerprinting techniques against the victim system for reconnaissance purposes.