This script is for Slackware 13.37 only and may be outdated.

SlackBuilds Repository

13.37 > Network > p0f (3.05b)

P0f is a tool that utilizes an array of sophisticated, purely passive
traffic fingerprinting mechanisms to identify the players behind any
incidental TCP/IP communications (often as little as a single normal SYN)
without interfering in any way. Version 3 is a complete rewrite of the
original codebase, incorporating a significant number of improvements
to network-level fingerprinting, and introducing the ability to reason
about application-level payloads (e.g., HTTP).

To build and install the optional signature and API tools, specify
TOOLS=yes to the SlackBuild, for example

TOOLS=yes sh p0f.SlackBuild

If you are upgrading from p0f version 2.0.8, please note that the files
/etc/p0f/p0f{a,o,r}.fp are no longer used and can be removed.

Maintained by: David Spencer
Keywords: fingerprint,security,honeypot,scanner
ChangeLog: p0f

Homepage:
http://lcamtuf.coredump.cx/p0f3/

Source Downloads:
p0f-3.05b.tgz (edbc4b135b2646db3227a441268fd2e2)

Download SlackBuild:
p0f.tar.gz
p0f.tar.gz.asc (FAQ)

(the SlackBuild does not include the source)

Individual Files:
README
doinst.sh
p0f.SlackBuild
p0f.info
slack-desc

Validated for Slackware 13.37

See our HOWTO for instructions on how to use the contents of this repository.

Access to the repository is available via:
ftp git cgit http rsync

© 2006-2024 SlackBuilds.org Project. All rights reserved.
Slackware® is a registered trademark of Patrick Volkerding
Linux® is a registered trademark of Linus Torvalds