Penetration Testing mailing list archives
SinFP 2.06, now works under big-endian architectures
From: "GomoR" <pt () gomor org>
Date: Thu, 21 Dec 2006 13:28:27 +0100
Hello,
SinFP is a new approach to OS fingerprinting, which bypasses limitations that nmap has. More info:http://www.gomor.org/sinfp . SinFP has now 140 signatures.
You can download it via CPAN, or via SourceForge:https://sourceforge.net/projects/sinfp
Also, two benchmarks versus Nmap have been done: http://www.phocean.net/index.php/post/2006/12/17/SinFPhttp://www.computerdefense.org/?p=173
This new release has been tested under Solaris 8/SPARC,and Mac OS X/PPC.
Example "advanced" usage: # sinfp.pl -kai www.heise.de P1: B00000 F0 W0 O0 M0P2: B11113 F0x12 W4320 O0204ffff010303000101080affffffff4445414401010402 M1440
P3: B11123 F0x14 W0 O0 M0 IPv4: unknown ## ## Retry in offline active mode: ## # sinfp.pl -1 -f sinfp4-193.99.144.85.80.pcap -HP2: B11113 F0x12 W4320 O0204ffff010303000101080affffffff4445414401010402 M1440 IPv4: BH0FH0WH2OH0MH1/P2: Unix: IRIX: 6.5
-- ^ ___ ___ http://www.GomoR.org/ <-+ | / __ |__/ Systems & Security Engineer | | \__/ | \ ---[ zsh$ alias psed='perl -pe ' ]--- | +--> Net::Frame <=> http://search.cpan.org/~gomor/ <---+
Current thread:
- SinFP 2.06, now works under big-endian architectures GomoR (Dec 21)