SinFP 2.06, now works under big-endian architectures

From: GomoR (pt@gomor.org)
Date: Thu Dec 21 2006 - 07:28:27 EST


Hello,

SinFP is a new approach to OS fingerprinting, which bypasses
limitations that nmap has. More info:
http://www.gomor.org/sinfp .

SinFP has now 140 signatures.

You can download it via CPAN, or via SourceForge:
https://sourceforge.net/projects/sinfp

Also, two benchmarks versus Nmap have been done:
http://www.phocean.net/index.php/post/2006/12/17/SinFP
http://www.computerdefense.org/?p=173

This new release has been tested under Solaris 8/SPARC,
and Mac OS X/PPC.

Example "advanced" usage:
# sinfp.pl -kai www.heise.de
P1: B00000 F0 W0 O0 M0
P2: B11113 F0x12 W4320 O0204ffff010303000101080affffffff4445414401010402
M1440
P3: B11123 F0x14 W0 O0 M0
IPv4: unknown
##
## Retry in offline active mode:
##
# sinfp.pl -1 -f sinfp4-193.99.144.85.80.pcap -H
P2: B11113 F0x12 W4320 O0204ffff010303000101080affffffff4445414401010402
M1440
IPv4: BH0FH0WH2OH0MH1/P2: Unix: IRIX: 6.5

-- 
 ^  ___  ___             http://www.GomoR.org/          <-+
 | / __ |__/          Systems & Security Engineer         |
 | \__/ |  \     ---[ zsh$ alias psed='perl -pe ' ]---    |
 +-->  Net::Frame <=> http://search.cpan.org/~gomor/  <---+


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:57:29 EDT