This script is for Slackware 13.0 only and may be outdated.

SlackBuilds Repository

13.0 > Network > p0f (2.0.8)

p0f v2 is a passive operating system fingerprinting tool.  
It can identify the OS on:
- machines that connect to your box (SYN mode),
- machines you connect to (SYN+ACK mode),
- machines you cannot connect to (RST+ mode),
- machines whose communications you can observe.

P0f can also detect or measure the following:
- firewall presence, NAT use,
- existence of a load balancer setup,
- the distance to the remote system and its uptime,
- other guy's network hookup (DSL, OC3, avian carriers) and his ISP.

Maintained by: David Spencer
Keywords: fingerprint,security,honeypot,scanner
ChangeLog: p0f

Homepage:
http://lcamtuf.coredump.cx/p0f.shtml

Source Downloads:
p0f-2.0.8.tgz (1ccbcd8d4c95ef6dae841120d23c56a5)

Download SlackBuild:
p0f.tar.gz
p0f.tar.gz.asc (FAQ)

(the SlackBuild does not include the source)

Individual Files:
README
doinst.sh
p0f.SlackBuild
p0f.info
slack-desc

Validated for Slackware 13.0

See our HOWTO for instructions on how to use the contents of this repository.

Access to the repository is available via:
ftp git cgit http rsync

© 2006-2024 SlackBuilds.org Project. All rights reserved.
Slackware® is a registered trademark of Patrick Volkerding
Linux® is a registered trademark of Linus Torvalds