1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-12-27 05:10:36 +00:00
freebsd-ports/net-mgmt/p0f/pkg-descr
Ryan Steinmetz 72b51b707b - Honor CC/CFLAGS (+fix clang build) [1]
- Add additional MASTER_SITES [1]
- Whitespace cleanup
- Mark JOBS_SAFE [1]
- Add LICENSE

PR:		ports/168133 [1]
Submitted by:	Kurt Jaeger <fbsd-ports@opsec.eu> (maintainer) [1]
2012-05-19 12:43:38 +00:00

24 lines
926 B
Plaintext

from the README:
Passive OS fingerprinting is based on information coming from a remote host
when it establishes a connection to our system. Captured packets contain
enough information to identify the operating system. In contrast to active
scanners such as nmap and QueSO, p0f does not send anything to the host being
identified.
For more information, read Spitzner's text at:
http://www.enteract.com/~lspitz/finger.html .
from the maintainer:
Use of this program requires read access to the packet filtering
device, typically /dev/bpf0. Granting such access allows the users
who have it to put your Ethernet device into promiscuous mode and
sniff your network. See
http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml
if you do not understand how this can be harmful. Running p0f with
no options will cause it to analyse packets intended for other
hosts.
WWW: http://lcamtuf.coredump.cx/p0f.shtml