This is fairly primitive. The techniques used by tools like nmap to fingerprint operating systems were established in the early 90's by Comer, and they involve behavioral testing. You should assume that even if you modify <i>all</i> the files in your (say) Wordpress distribution, an attacker can still fingerprint it.