1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-12-17 03:25:46 +00:00
freebsd-ports/net-mgmt/p0f/pkg-descr
Alexey Dokuchaev 152047e855 - Restore link to Lance Spitzner's article (2002 Honeynet Project version)
- Remove nowadays defunct www.infoworld.com link (missed in r426160)

Submitted by:	Royce Williams
2016-11-22 12:30:56 +00:00

17 lines
794 B
Plaintext

Passive OS fingerprinting is based on information coming from a remote host
when it establishes a connection to our system. Captured packets contain
enough information to identify the operating system. In contrast to active
scanners such as nmap and QueSO, p0f does not send anything to the host
being identified.
For more information, refer to Lance Spitzner's old paper about passive OS
fingerprinting: http://old.honeynet.org/papers/finger/.
Use of this program requires read access to the packet filtering device,
typically /dev/bpf0. Granting such access allows the users who have it to
put your Ethernet device into promiscuous mode and sniff your network.
Running p0f with no options will cause it to analyze packets intended for
other hosts.
WWW: http://lcamtuf.coredump.cx/p0f3/