This script is for Slackware 14.0 and may be outdated.

SlackBuilds Repository

14.0 > Network > p0f (3.06b)

P0f is a tool that utilizes an array of sophisticated, purely passive
traffic fingerprinting mechanisms to identify the players behind any
incidental TCP/IP communications (often as little as a single normal SYN)
without interfering in any way. Version 3 is a complete rewrite of the
original codebase, incorporating a significant number of improvements
to network-level fingerprinting, and introducing the ability to reason
about application-level payloads (e.g., HTTP).

To build and install the optional signature and API tools, specify
TOOLS=yes to the SlackBuild, for example

TOOLS=yes sh p0f.SlackBuild

Maintained by: David Spencer
Keywords: fingerprint,security,honeypot,scanner


Source Downloads:
p0f-3.06b.tgz (1a07d6220d9e57d8d098905b7ca6844a)

Download SlackBuild:
p0f.tar.gz.asc (FAQ)

(the SlackBuild does not include the source)

Individual Files:

Validated for Slackware 14.0

See our HOWTO for instructions on how to use the contents of this repository.

Access to the repository is available via:
ftp git cgit http rsync

© 2006-2017 Project. All rights reserved.
Slackware® is a registered trademark of Patrick Volkerding
Linux® is a registered trademark of Linus Torvalds
Web Design by WebSight Designs |  Managed Hosting by OnyxLight Communications