p0f v2 is a passive operating system fingerprinting tool.
It can identify the OS on:
- machines that connect to your box (SYN mode),
- machines you connect to (SYN+ACK mode),
- machines you cannot connect to (RST+ mode),
- machines whose communications you can observe.
P0f can also detect or measure the following:
- firewall presence, NAT use,
- existence of a load balancer setup,
- the distance to the remote system and its uptime,
- other guy's network hookup (DSL, OC3, avian carriers) and his ISP.
Maintained by: David Spencer
Keywords: fingerprint,security,honeypot,scanner
ChangeLog: p0f
Homepage:
http://lcamtuf.coredump.cx/p0f.shtml
Download SlackBuild:
p0f.tar.gz
p0f.tar.gz.asc (FAQ)
(the SlackBuild does not include the source)
Individual Files: |
README |
doinst.sh |
p0f.SlackBuild |
p0f.info |
slack-desc |
© 2006-2024 SlackBuilds.org Project. All rights reserved.
Slackware® is a registered trademark of
Patrick Volkerding
Linux® is a registered trademark of
Linus Torvalds