Security of Information, Threat Intelligence, Hacking, Offensive Security, Pentest, Open Source, Hackers Tools, Leaks, Pr1v8, Premium Courses Free, etc

Wednesday, January 20, 2016

Passive Traffic Fingerprinting - p0f




P0f is a tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind any incidental TCP/IP communications (often as little as a single normal SYN) without interfering in any way. Version 3 is a complete rewrite of the original codebase, incorporating a significant number of improvements to network-level fingerprinting, and introducing the ability to reason about application-level payloads (e.g., HTTP).



Features

p0f can identify the system on:

Âşmachines that connect to your box (SYN mode)
Âşmachines you connect to (SYN+ACK mode)
Âşmachines you cannot connect to (RST+ mode)
Âşmachines that talk through or near your box

But checking the system is not all p0f can do, p0f will also check the following:

Âşmasquerading and firewall presence (useful for policy enforcement)
Âşthe distance to the remote system and its uptime
Âşother guys’ network hookup (DSL, OC3, avian carriers) and his ISP

Passive Traffic Fingerprinting:

ÂşHighly scalable and extremely fast identification of the operating system and software on both endpoints of a vanilla TCP connection – especially in settings where NMap probes are blocked, too slow, unreliable, or would simply set off alarms.

ÂşMeasurement of system uptime and network hookup, distance (including topology behind NAT or packet filters), user language preferences, and so on.

ÂşAutomated detection of connection sharing / NAT, load balancing, and application-level proxying setups.

ÂşDetection of clients and servers that forge declarative statements such as X-Mailer or User-Agent.


The tool can be operated in the foreground or as a daemon, and offers a simple real-time API for third-party components that wish to obtain additional information about the actors they are talking to.

Common uses for p0f include reconnaissance during penetration tests; routine network monitoring; detection of unauthorized network interconnects in corporate environments; providing signals for abuse-prevention tools; and miscellanous forensics.


In one form or another, earlier versions of p0f are used in a wide variety of projects, including  pfsense,  Ettercap,  PRADS,  amavisd, milter, postgrey, fwknop,Satori, the OpenBSD firewall, and an assortment of commercial tools.


Share:

0 comentários:

Post a Comment

Note: Only a member of this blog may post a comment.

Established in 2015. Offensive Sec Blog has been sharing security research, hacking tools, threat intelligence, and offensive security content since 2015.
Copyright © OffSec Blog | Powered by OffensiveSec
Design by OffSec | Built for the security community