Tool and Usage
- Michał Zalewski
- Latest release
- No release found
- Latest release date
This tool is a great addition to nmap, especially if that reveals not reliable data or none at all. Due to the passive way of working, it won't be detected nor influences any connection.
- Version 3 of p0f is a full rewrite
- The idea for p0f dates back to June 10, 2000
- Tool can run in foreground or as a daemon process
Common uses for p0f include reconnaissance during penetration tests; routine network monitoring; detection of unauthorized network interconnects in corporate environments; providing signals for abuse-prevention tools; and miscellaneous forensics.
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
- + Project is mature (10+ years)
- + The source code of this software is available
- + Well-known tool
Similar tools to p0f:
InstaRecon is a security tool that can help with the reconnaissance phase of a penetration test. It can collect a number of data points with limited input.
Sn1per is security scanner that can be used during a penetration test to enumerate and scan for vulnerabilities.
Plecost is a security tool to fingerprint WordPress installations and find available vulnerabilities.
This tool page was updated at . Found an improvement? Help the community by submitting an update.