SlackBuilds Repository

13.1 > Network > p0f (2.0.8)

p0f v2 is a passive operating system fingerprinting tool.
It can identify the OS on:
- machines that connect to your box (SYN mode),
- machines you connect to (SYN+ACK mode),
- machines you cannot connect to (RST+ mode),
- machines whose communications you can observe.

P0f can also detect or measure the following:
- firewall presence, NAT use,
- existence of a load balancer setup,
- the distance to the remote system and its uptime,
- other guy's network hookup (DSL, OC3, avian carriers) and his ISP.

Maintained by: David Spencer
Approved by: rworkman
Keywords: fingerprint,security,honeypot,scanner

Homepage:
http://lcamtuf.coredump.cx/p0f.shtml

Source Downloads:
p0f-2.0.8.tgz (1ccbcd8d4c95ef6dae841120d23c56a5)

Download SlackBuild:
p0f.tar.gz
p0f.tar.gz.asc (FAQ)

(the SlackBuild does not include the source)

Individual Files:
README
doinst.sh
p0f.SlackBuild
p0f.info
slack-desc

See our HOWTO for instructions on how to use the contents of this repository.

Access to the repository is available via:
ftp git cgit http rsync

[  Exec: 0.0283 sec  |  Load: 0.15 0.20 0.17  ]

© 2006-2014 SlackBuilds.org Project. All rights reserved.
Slackware® is a registered trademark of Patrick Volkerding
Linux® is a registered trademark of Linus Torvalds
Web Design by WebSight Designs |  Managed Hosting by OnyxLight Communications