p0f

LSE toolsLSE toolsp0f (492)p0f (492)

Tool and Usage

Project details
AuthorMichał Zalewski
Latest releaseNo release found

Project health

56
This score is calculated by different factors, like project age, last release date, etc.

Introduction

This tool is a great addition to nmap, especially if that reveals not reliable data or none at all. Due to the passive way of working, it won't be detected nor influences any connection.

- Version 3 of p0f is a full rewrite
- The idea for p0f dates back to June 10, 2000
- Tool can run in foreground or as a daemon process

Common uses for p0f include reconnaissance during penetration tests; routine network monitoring; detection of unauthorized network interconnects in corporate environments; providing signals for abuse-prevention tools; and miscellaneous forensics.

Tool review and remarks

The review and analysis of this project resulted in the following remarks for this security tool:

Strengths

  • + Project is mature (10+ years)
  • + The source code of this software is available
  • + Well-known tool

Author and Maintainers

P0f is under development by Michał Zalewski.

p0f alternatives

Similar tools to p0f:

60

InstaRecon

InstaRecon is a security tool that can help with the reconnaissance phase of a penetration test. It can collect a number of data points with limited input.

78

Sn1per

Sn1per is security scanner that can be used during a penetration test to enumerate and scan for vulnerabilities.

60

Plecost

Plecost is a security tool to fingerprint WordPress installations and find available vulnerabilities.

All p0f alternatives

Found an improvement? Help the community by submitting an update.

Related tool information