P0f is a tool that utilizes an array of sophisticated, purely passive
traffic fingerprinting mechanisms to identify the players behind
any incidental TCP/IP communications (often as little as a single
normal SYN) without interfering in any way. Version 3 is a complete
rewrite of the original codebase, incorporating a significant number
of improvements to network-level fingerprinting, and introducing the
ability to reason about application-level payloads (e.g., HTTP).
To build and install the optional signature and API tools, specify
TOOLS=yes to the SlackBuild, for example
TOOLS=yes sh p0f.SlackBuild
Maintained by: David Spencer
Keywords: fingerprint,security,honeypot,scanner
ChangeLog: p0f
Homepage:
http://lcamtuf.coredump.cx/p0f3/
Download SlackBuild:
p0f.tar.gz
p0f.tar.gz.asc (FAQ)
(the SlackBuild does not include the source)
Individual Files: |
README |
doinst.sh |
p0f.SlackBuild |
p0f.info |
slack-desc |
© 2006-2025 SlackBuilds.org Project. All rights reserved.
Slackware® is a registered trademark of
Patrick Volkerding
Linux® is a registered trademark of
Linus Torvalds