#p0f

π™½π™΄πšƒπšπ™΄πš‚π™΄π™²netresec@infosec.exchange
2024-10-22

Erik and @jonasl’s Network Fingerprinting talk is now online. It covers #JA4 and #JARM by John Althouse, @lcamtuf’s #p0f and Eric Kollmann’s Satori.
youtube.com/watch?v=1_VbYp4Zyn

2020-10-08

#p0f is a passive fingerprinter.

p0f is a tool that passively looks through an interface's packets to see if any contain special information. p0f can gather details on the operating system used, uptime, links, browser, and raw details for further processing if desired. Since p0f is passive it can be used without much fuss, and can't be detected outside of the fingerprinting server.

Website πŸ”—οΈ: lcamtuf.coredump.cx/p0f3/

apt πŸ“¦οΈ: p0f

#free #opensource #foss #fossmendations #security

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst