- New port: p0f2 Passive OS fingerprinting tool p0f version 2 gives better 3
PR: ports/169855 Submitted by: Denis Pokataev <catone@cpan.org>
This commit is contained in:
parent
ec407ff47c
commit
d9258d62e7
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=301727
5 changed files with 87 additions and 0 deletions
|
@ -190,6 +190,7 @@
|
|||
SUBDIR += openvmps
|
||||
SUBDIR += ourmon
|
||||
SUBDIR += p0f
|
||||
SUBDIR += p0f2
|
||||
SUBDIR += p5-AnyEvent-SNMP
|
||||
SUBDIR += p5-Cflow
|
||||
SUBDIR += p5-Cisco-Reconfig
|
||||
|
|
50
net-mgmt/p0f2/Makefile
Normal file
50
net-mgmt/p0f2/Makefile
Normal file
|
@ -0,0 +1,50 @@
|
|||
# New ports collection makefile for: p0f2
|
||||
# Date created: 2012-07-30
|
||||
# Whom: Denis Pokataev <catone@cpan.org>
|
||||
#
|
||||
# $FreeBSD$
|
||||
#
|
||||
|
||||
PORTNAME= p0f2
|
||||
PORTVERSION= 2.0.8
|
||||
CATEGORIES= net-mgmt security
|
||||
MASTER_SITES= http://lcamtuf.coredump.cx/p0f/ \
|
||||
http://farrokhi.net/distfiles/
|
||||
DISTNAME= p0f-${DISTVERSION}
|
||||
EXTRACT_SUFX= .tgz
|
||||
|
||||
MAINTAINER= catone@cpan.org
|
||||
COMMENT= Passive OS fingerprinting tool
|
||||
|
||||
CONFLICTS= p0f-3.*
|
||||
|
||||
USE_GMAKE= yes
|
||||
ALL_TARGET= all p0fq tools
|
||||
PORTDOCS= COPYING CREDITS ChangeLog KNOWN_BUGS README TODO win-memleak.txt
|
||||
MAN1= p0f.1
|
||||
WRKSRC= ${WRKDIR}/p0f
|
||||
|
||||
post-patch:
|
||||
.for f in config.h doc/README
|
||||
@${REINPLACE_CMD} -e 's|/etc|${PREFIX}/etc|g' ${WRKSRC}/${f}
|
||||
.endfor
|
||||
|
||||
do-install:
|
||||
.for ii in p0f test/p0fq test/sendack test/sendack2 test/sendsyn
|
||||
${INSTALL_PROGRAM} ${WRKSRC}/${ii} ${PREFIX}/bin
|
||||
.endfor
|
||||
${INSTALL_SCRIPT} ${WRKSRC}/p0frep ${PREFIX}/bin
|
||||
${MKDIR} ${PREFIX}/etc/p0f
|
||||
.for ii in . a. o. r.
|
||||
${INSTALL_DATA} ${WRKSRC}/p0f${ii}fp ${PREFIX}/etc/p0f
|
||||
.endfor
|
||||
${INSTALL_MAN} ${WRKSRC}/${MAN1} ${MANPREFIX}/man/man1
|
||||
|
||||
.if !defined(NOPORTDOCS)
|
||||
${MKDIR} ${DOCSDIR}
|
||||
.for ii in ${PORTDOCS}
|
||||
${INSTALL_DATA} ${WRKSRC}/doc/${ii} ${DOCSDIR}
|
||||
.endfor
|
||||
.endif
|
||||
|
||||
.include <bsd.port.mk>
|
2
net-mgmt/p0f2/distinfo
Normal file
2
net-mgmt/p0f2/distinfo
Normal file
|
@ -0,0 +1,2 @@
|
|||
SHA256 (p0f-2.0.8.tgz) = 6c4d8745f04e59f2ba68d56fd1554551592f08a0497c9fc21b84498f47d1aee0
|
||||
SIZE (p0f-2.0.8.tgz) = 136877
|
23
net-mgmt/p0f2/pkg-descr
Normal file
23
net-mgmt/p0f2/pkg-descr
Normal file
|
@ -0,0 +1,23 @@
|
|||
from the README:
|
||||
|
||||
Passive OS fingerprinting is based on information coming from a remote host
|
||||
when it establishes a connection to our system. Captured packets contain
|
||||
enough information to identify the operating system. In contrast to active
|
||||
scanners such as nmap and QueSO, p0f does not send anything to the host being
|
||||
identified.
|
||||
|
||||
For more information, read Spitzner's text at:
|
||||
http://www.enteract.com/~lspitz/finger.html .
|
||||
|
||||
from the maintainer:
|
||||
|
||||
Use of this program requires read access to the packet filtering
|
||||
device, typically /dev/bpf0. Granting such access allows the users
|
||||
who have it to put your Ethernet device into promiscuous mode and
|
||||
sniff your network. See
|
||||
http://www.infoworld.com/articles/op/xml/00/05/29/000529opswatch.xml
|
||||
if you do not understand how this can be harmful. Running p0f with
|
||||
no options will cause it to analyse packets intended for other
|
||||
hosts.
|
||||
|
||||
WWW: http://lcamtuf.coredump.cx/p0f.shtml
|
11
net-mgmt/p0f2/pkg-plist
Normal file
11
net-mgmt/p0f2/pkg-plist
Normal file
|
@ -0,0 +1,11 @@
|
|||
bin/p0f
|
||||
bin/p0fq
|
||||
bin/p0frep
|
||||
bin/sendack
|
||||
bin/sendack2
|
||||
bin/sendsyn
|
||||
etc/p0f/p0f.fp
|
||||
etc/p0f/p0fa.fp
|
||||
etc/p0f/p0fo.fp
|
||||
etc/p0f/p0fr.fp
|
||||
@dirrmtry etc/p0f
|
Loading…
Reference in a new issue