Commit graph

12 commits

Author SHA1 Message Date
Andrew Pantyukhin
540cd42010 - Update to 20070407 snapshot 2007-04-07 15:52:14 +00:00
Andrew Pantyukhin
7523c9821c - Update to 20070322 fingerprints 2007-03-23 00:24:57 +00:00
Andrew Pantyukhin
33dbf061ea - Update to 2.04 2006-11-05 19:25:41 +00:00
Andrew Pantyukhin
934215486d - Update to 20061101 snapshot 2006-11-01 22:16:41 +00:00
Andrew Pantyukhin
be2bd16f64 - Update to 2.03 2006-11-01 14:40:52 +00:00
Andrew Pantyukhin
bcb02aab56 - Update to 20061009 fingerprints 2006-10-09 20:36:50 +00:00
Andrew Pantyukhin
c16b6f9b84 - Update to 20061007 fingerprints 2006-10-07 14:58:44 +00:00
Andrew Pantyukhin
13656ce767 - Separate sinfp into library (p5-Net-SinFP) and binary+db (sinfp)
- Use latest db snapshot
2006-09-30 15:36:00 +00:00
Andrew Pantyukhin
1a8239fb0e - Use CPAN version
- Resolve all conflicts
2006-09-28 12:54:35 +00:00
Andrew Pantyukhin
5add2873e7 - Mark only usable on little-endian archs
Reported by:	pointyhat via kris
2006-09-13 07:31:52 +00:00
Andrew Pantyukhin
50c9fb9127 - Update to 2.02 2006-08-29 05:03:46 +00:00
Andrew Pantyukhin
c295728bd5 Add port security/sinfp:
SinFP is a new approach to OS fingerprinting, which bypasses
limitations that nmap has.

Nmap approaches to fingerprinting as shown to be efficient for years.
Nowadays, with the omni-presence of stateful filtering devices,
PAT/NAT configurations and emerging packet normalization technologies,
its approach to OS fingerprinting is becoming to be obsolete.

SinFP uses the aforementioned limitations as a basis for tests to be
obsolutely avoided in used frames to identify accurately the remote
operating system. That is, it only requires one open TCP port, sends
only fully standard TCP packets, and limits the number of tests to 2
or 3 (with only 1 test giving the OS reliably in most cases).

WWW: http://www.gomor.org/sinfp
2006-08-21 07:46:31 +00:00