{"id":1134,"date":"2008-10-13T10:39:11","date_gmt":"2008-10-13T10:39:11","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=1134"},"modified":"2015-09-09T19:39:14","modified_gmt":"2015-09-09T11:39:14","slug":"p0f-advanced-passive-os-fingerprinting-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2008\/10\/p0f-advanced-passive-os-fingerprinting-tool\/","title":{"rendered":"p0f – Advanced Passive OS Fingerprinting Tool"},"content":{"rendered":"

[ad]<\/p>\n

Ah can’t believe I haven’t posted about this one before, one of my favourite tools! It was a big breakthrough to have a passive OS-fingerprinting tool after relying on Nmap<\/a> and Xprobe2<\/a> for the longest time.<\/p>\n

OS fingerprinting<\/a> is a very important part of a pen-test during the information gathering stage.<\/p>\n

P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on:<\/p>\n