mirror of
				https://github.com/telekom-security/tpotce.git
				synced 2025-10-30 20:12:53 +00:00 
			
		
		
		
	
		
			
	
	
		
			30 lines
		
	
	
	
		
			1.4 KiB
		
	
	
	
		
			Text
		
	
	
	
	
	
		
		
			
		
	
	
			30 lines
		
	
	
	
		
			1.4 KiB
		
	
	
	
		
			Text
		
	
	
	
	
	
|   | ----------------------------- | ||
|  | Some random food for thought: | ||
|  | ----------------------------- | ||
|  | 
 | ||
|  | 1) If you run p0f on any reasonably popular server, you will probably see quite | ||
|  |    a few systems that seem to be leaking memory in TCP headers (e.g. ACK number | ||
|  |    or second timestamp set on SYN packets, URG pointer without URG flag, etc). | ||
|  |    You will also see HTTP traffic with non-stripped Proxy-Authorization headers | ||
|  |    and other hilarious abnormalities. | ||
|  | 
 | ||
|  |    Unfortunately, pinpointing the sources of many of these leaks is pretty hard; | ||
|  |    they often trace to proprietary corporate proxies and firewalls, and unless | ||
|  |    it's *your* proxy or firewall, you won't be finding out more. If you wish to | ||
|  |    put some investigative effort into this, there are quite a few bugs waiting | ||
|  |    to be tracked down, though :-) | ||
|  | 
 | ||
|  | 2) After some hesitation, I decided *against* the inclusion of encrypted traffic | ||
|  |    classification features into p0f. Timing, packet size, and direction | ||
|  |    information lets you, for example, reliably differentiate between interactive | ||
|  |    SSH sessions and SFTP uploads or downloads; automated and human password | ||
|  |    entry attemps; or failed and successful auth. | ||
|  | 
 | ||
|  |    The same goes for SSL: you can tell normal HTTPS browsing from file uploads, | ||
|  |    from attempts to smuggle, say, PPP over SSL. In the end, however, it seems | ||
|  |    like stretch to cram it into p0f; one day, I might improve my ancient 'fl0p' | ||
|  |    tool, instead: | ||
|  | 
 | ||
|  |    http://lcamtuf.coredump.cx/soft/fl0p-devel.tgz | ||
|  | 
 |