slackbuilds/network/p0f
David Spencer a9c294f0ea network/p0f: Added to 12.0 repository 2010-05-11 20:01:41 +02:00
..
README network/p0f: Added to 12.0 repository 2010-05-11 20:01:41 +02:00
doinst.sh network/p0f: Added to 12.0 repository 2010-05-11 20:01:41 +02:00
p0f.SlackBuild network/p0f: Added to 12.0 repository 2010-05-11 20:01:41 +02:00
p0f.info network/p0f: Added to 12.0 repository 2010-05-11 20:01:41 +02:00
slack-desc network/p0f: Added to 12.0 repository 2010-05-11 20:01:41 +02:00

README

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

p0f v2 is a passive operating system fingerprinting tool.  
It can identify the OS on:
   - machines that connect to your box (SYN mode),
   - machines you connect to (SYN+ACK mode),
   - machines you cannot connect to (RST+ mode),
   - machines whose communications you can observe.

P0f can also detect or measure the following:
   - firewall presence, NAT use,
   - existence of a load balancer setup,
   - the distance to the remote system and its uptime,
   - other guy's network hookup (DSL, OC3, avian carriers) and his ISP.