Home page logo
/

P0f

P0f is able to identify the operating system of a target host simply by examining captured packets even when the device in question is behind an overzealous packet firewall. P0f does not generate ANY additional network traffic, direct or indirect. No name lookups, no mysterious probes, no ARIN queries, nothing. In the hands of advanced users, P0f can detect firewall presence, NAT use, existence of load balancers, and more! For downloads and more information, visit the P0f homepage.

Popularity #84, 51
Rating no rating
Latest release 2.0.8
Sept. 6, 2006
(8 years, 1 month ago)
Homepage/Download
Wikipedia
Outdated/incomplete?
★★★★★ 
 0%
★★★★ 
 0%
★★★ 
 0%
★★ 
 0%
★ 
 0%

No comments

Your comment

Along with your rating, you can use the comment form to post a review, tutorial, tips and tricks, or anything else others will find useful. If you develop this software (or work for the company), please don't rate it. You may leave a clarifying comment as long as you state your affiliation and don't specify a star rating (just leave it as “No rating”).

 
 
  (will not be shown, will not be spammed)
  (web site, Twitter, Facebook, etc.)
(At least 50 characters. No markup is allowed. URLs will be made into links.)
 569 * 55 + 42 = ????? (antispam)

Feed for updates.

Home

[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]