[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20061221121622.GA3495@oshima.enslaved.lan>
Date: Thu, 21 Dec 2006 13:16:22 +0100
From: GomoR <fd@...or.org>
To: full-disclosure@...ts.grok.org.uk
Subject: SinFP 2.06,
now works under big-endian architectures
Hello,
SinFP is a new approach to OS fingerprinting, which bypasses
limitations that nmap has. More info:
http://www.gomor.org/sinfp .
SinFP has now 140 signatures.
You can download it via CPAN, or via SourceForge:
https://sourceforge.net/projects/sinfp
Also, two benchmarks versus Nmap have been done:
http://www.phocean.net/index.php/post/2006/12/17/SinFP
http://www.computerdefense.org/?p=173
This new release has been tested under Solaris 8/SPARC,
and Mac OS X/PPC.
Example "advanced" usage:
# sinfp.pl -kai www.heise.de
P1: B00000 F0 W0 O0 M0
P2: B11113 F0x12 W4320 O0204ffff010303000101080affffffff4445414401010402 M1440
P3: B11123 F0x14 W0 O0 M0
IPv4: unknown
##
## Retry in offline active mode:
##
# sinfp.pl -1 -f sinfp4-193.99.144.85.80.pcap -H
P2: B11113 F0x12 W4320 O0204ffff010303000101080affffffff4445414401010402 M1440
IPv4: BH0FH0WH2OH0MH1/P2: Unix: IRIX: 6.5
--
^ ___ ___ http://www.GomoR.org/ <-+
| / __ |__/ Systems & Security Engineer |
| \__/ | \ ---[ zsh$ alias psed='perl -pe ' ]--- |
+--> Net::Frame <=> http://search.cpan.org/~gomor/ <---+
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists