mirror of
https://git.FreeBSD.org/ports.git
synced 2024-12-27 05:10:36 +00:00
72b51b707b
- Add additional MASTER_SITES [1] - Whitespace cleanup - Mark JOBS_SAFE [1] - Add LICENSE PR: ports/168133 [1] Submitted by: Kurt Jaeger <fbsd-ports@opsec.eu> (maintainer) [1]
24 lines
926 B
Plaintext
24 lines
926 B
Plaintext
from the README:
|
|
|
|
Passive OS fingerprinting is based on information coming from a remote host
|
|
when it establishes a connection to our system. Captured packets contain
|
|
enough information to identify the operating system. In contrast to active
|
|
scanners such as nmap and QueSO, p0f does not send anything to the host being
|
|
identified.
|
|
|
|
For more information, read Spitzner's text at:
|
|
http://www.enteract.com/~lspitz/finger.html .
|
|
|
|
from the maintainer:
|
|
|
|
Use of this program requires read access to the packet filtering
|
|
device, typically /dev/bpf0. Granting such access allows the users
|
|
who have it to put your Ethernet device into promiscuous mode and
|
|
sniff your network. See
|
|
http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml
|
|
if you do not understand how this can be harmful. Running p0f with
|
|
no options will cause it to analyse packets intended for other
|
|
hosts.
|
|
|
|
WWW: http://lcamtuf.coredump.cx/p0f.shtml
|