diff options
author | Steve Price <steve@FreeBSD.org> | 2000-07-10 03:51:01 +0000 |
---|---|---|
committer | Steve Price <steve@FreeBSD.org> | 2000-07-10 03:51:01 +0000 |
commit | 0a382d079da182d4a673590024ff181ba5ab7d5d (patch) | |
tree | 61c0da75a9a193c6b0ce857def183cf86fef8234 /net-mgmt/p0f/pkg-descr | |
parent | 0ca0371584df17725e255c1a21421319fef33dde (diff) | |
download | ports-0a382d079da182d4a673590024ff181ba5ab7d5d.tar.gz ports-0a382d079da182d4a673590024ff181ba5ab7d5d.zip |
Notes
Diffstat (limited to 'net-mgmt/p0f/pkg-descr')
-rw-r--r-- | net-mgmt/p0f/pkg-descr | 24 |
1 files changed, 24 insertions, 0 deletions
diff --git a/net-mgmt/p0f/pkg-descr b/net-mgmt/p0f/pkg-descr new file mode 100644 index 000000000000..a48562804ca6 --- /dev/null +++ b/net-mgmt/p0f/pkg-descr @@ -0,0 +1,24 @@ +from the README: + +Passive OS fingerprinting is based on information coming from a remote host +when it establishes a connection to our system. Captured packets contain +enough information to identify the operating system. In contrast to active +scanners such as nmap and QueSO, p0f does not send anything to the host being +identified. + +For more information, read Spitzner's text at: +http://www.enteract.com/~lspitz/finger.html . + +from the maintainer: + +Use of this program requires read access to the packet filtering +device, typically /dev/bpf0. Granting such access allows the users +who have it to put your Ethernet device into promiscuous mode and +sniff your network. See +http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml +if you do not understand how this can be harmful. Running p0f with +no options will cause it to analyse packets intended for other +hosts. + +Trevor Johnson +trevor@jpj.net |