This script is for Slackware 13.1 and may be outdated.

SlackBuilds Repository

13.1 > Network > p0f (2.0.8)

p0f v2 is a passive operating system fingerprinting tool.  
It can identify the OS on:
- machines that connect to your box (SYN mode),
- machines you connect to (SYN+ACK mode),
- machines you cannot connect to (RST+ mode),
- machines whose communications you can observe.

P0f can also detect or measure the following:
- firewall presence, NAT use,
- existence of a load balancer setup,
- the distance to the remote system and its uptime,
- other guy's network hookup (DSL, OC3, avian carriers) and his ISP.

Maintained by: David Spencer
Keywords: fingerprint,security,honeypot,scanner
ChangeLog: p0f


Source Downloads:
p0f-2.0.8.tgz (1ccbcd8d4c95ef6dae841120d23c56a5)

Download SlackBuild:
p0f.tar.gz.asc (FAQ)

(the SlackBuild does not include the source)

Individual Files:

Validated for Slackware 13.1

See our HOWTO for instructions on how to use the contents of this repository.

Access to the repository is available via:
ftp git cgit http rsync

© 2006-2018 Project. All rights reserved.
Slackware® is a registered trademark of Patrick Volkerding
Linux® is a registered trademark of Linus Torvalds
Web Design by WebSight Designs |  Managed Hosting by OnyxLight Communications