LinuxCommandLibrary
GitHubF-DroidGoogle Play Store

p0f

performs passive OS fingerprinting

TLDR

Start fingerprinting
$ p0f -i [eth0]
copy
Read from pcap
$ p0f -r [capture.pcap]
copy
Write to log file
$ p0f -i [eth0] -o [log.txt]
copy
Fingerprint specific port
$ p0f -i [eth0] "port 80"
copy
Run in background
$ p0f -i [eth0] -d
copy

SYNOPSIS

p0f [options] [filter]

DESCRIPTION

p0f is a passive OS, application, and link-type fingerprinter. It listens to TCP/IP traffic without sending any packets and infers the remote operating system, MTU/uplink, NAT presence, and approximate uptime from quirks of the SYN, SYN+ACK, and HTTP traffic it observes.Because it never probes the target, p0f is invisible on the wire and well-suited to forensic analysis of pcaps, fingerprinting visitors of a public-facing service, and detecting policy violations such as un-NATted devices behind a firewall.

PARAMETERS

-i INTERFACE

Listen on the named network interface.
-r FILE
Read packets from a pcap capture file instead of a live interface.
-o FILE
Append fingerprinting results to FILE (text log).
-w FILE
Write captured packets to a new pcap file (similar to tcpdump -w).
-s PATH
Listen on PATH as a Unix domain socket for API queries.
-d
Run as a daemon in the background. Requires -o or -s.
-u USER
Drop privileges to USER after opening the capture interface.
-p
Put the interface into promiscuous mode.
-f FILE
Use FILE as the fingerprint database (default: /etc/p0f/p0f.fp).
-S N
Set the max number of concurrent API connections.
-c DIR
Restrict output by chrooting to DIR.
-L
List available capture interfaces and exit.
--help
Display help information.

CAVEATS

Needs raw socket / CAP_NET_RAW access (or root). Detection quality depends on having a current p0f.fp signature database. p0f v3 is a rewrite that does not read v2 fingerprint files; ensure the bundled fingerprints match the binary version.

HISTORY

p0f was created by Michal Zalewski for passive TCP/IP stack fingerprinting.

SEE ALSO

nmap(1), tcpdump(1), wireshark(1)

Copied to clipboard
Kai