mirror of
https://github.com/telekom-security/tpotce.git
synced 2025-04-20 06:02:24 +00:00
.. | ||
docs | ||
tools | ||
alloc-inl.h | ||
api.c | ||
api.h | ||
build.sh | ||
config.h | ||
debug.h | ||
docker-compose.yml | ||
Dockerfile | ||
fp_http.c | ||
fp_http.h | ||
fp_mtu.c | ||
fp_mtu.h | ||
fp_tcp.c | ||
fp_tcp.h | ||
hash.h | ||
languages.h | ||
Makefile | ||
p0f.c | ||
p0f.fp | ||
p0f.h | ||
process.c | ||
process.h | ||
readfp.c | ||
readfp.h | ||
README.md | ||
tcp.h | ||
types.h |
p0f
p0f P0f is a tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind any incidental TCP/IP communications (often as little as a single normal SYN) without interfering in any way.
This dockerized version is part of the T-Pot community honeypot of Deutsche Telekom AG.
The Dockerfile
contains the blueprint for the dockerized p0f and will be used to setup the docker image.
The docker-compose.yml
contains the necessary settings to test p0f using docker-compose
. This will ensure to start the docker container with the appropriate permissions and port mappings.