aboutsummaryrefslogtreecommitdiffstats
path: root/security/sinfp
Commit message (Collapse)AuthorAgeFilesLines
* - Update signatures to 20080419sat2008-04-211-1/+1
|
* - Update signatures to 20080308sat2008-03-091-1/+1
|
* - Update to 20080103 snapshotsat2008-01-081-1/+1
|
* - Update to 20071229 snapshotsat2008-01-011-1/+1
|
* - Update signatures to 20071228 snapshotsat2007-12-281-1/+1
|
* - Update to 20070407 snapshotsat2007-04-071-1/+1
|
* - Update to 20070322 fingerprintssat2007-03-231-1/+1
|
* - Update to 2.04sat2006-11-061-1/+1
|
* - Update to 20061101 snapshotsat2006-11-021-1/+1
|
* - Update to 2.03sat2006-11-011-2/+1
|
* - Update to 20061009 fingerprintssat2006-10-101-1/+1
|
* - Update to 20061007 fingerprintssat2006-10-071-1/+1
|
* - Separate sinfp into library (p5-Net-SinFP) and binary+db (sinfp)sat2006-09-304-77/+21
| | | | - Use latest db snapshot
* - Use CPAN versionsat2006-09-284-72/+23
| | | | - Resolve all conflicts
* - Mark only usable on little-endian archssat2006-09-131-0/+3
| | | | Reported by: pointyhat via kris
* - Update to 2.02sat2006-08-292-4/+4
|
* Add port security/sinfp:sat2006-08-214-0/+135
SinFP is a new approach to OS fingerprinting, which bypasses limitations that nmap has. Nmap approaches to fingerprinting as shown to be efficient for years. Nowadays, with the omni-presence of stateful filtering devices, PAT/NAT configurations and emerging packet normalization technologies, its approach to OS fingerprinting is becoming to be obsolete. SinFP uses the aforementioned limitations as a basis for tests to be obsolutely avoided in used frames to identify accurately the remote operating system. That is, it only requires one open TCP port, sends only fully standard TCP packets, and limits the number of tests to 2 or 3 (with only 1 test giving the OS reliably in most cases). WWW: http://www.gomor.org/sinfp