mirror of
https://github.com/telekom-security/tpotce.git
synced 2025-10-24 01:04:43 +00:00
| .. | ||
| docs | ||
| tools | ||
| alloc-inl.h | ||
| api.c | ||
| api.h | ||
| build.sh | ||
| config.h | ||
| debug.h | ||
| docker-compose.yml | ||
| Dockerfile | ||
| fp_http.c | ||
| fp_http.h | ||
| fp_mtu.c | ||
| fp_mtu.h | ||
| fp_tcp.c | ||
| fp_tcp.h | ||
| hash.h | ||
| languages.h | ||
| Makefile | ||
| p0f.c | ||
| p0f.fp | ||
| p0f.h | ||
| process.c | ||
| process.h | ||
| readfp.c | ||
| readfp.h | ||
| README.md | ||
| tcp.h | ||
| types.h | ||
p0f
p0f P0f is a tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind any incidental TCP/IP communications (often as little as a single normal SYN) without interfering in any way.
This dockerized version is part of the T-Pot community honeypot of Deutsche Telekom AG.
The Dockerfile contains the blueprint for the dockerized p0f and will be used to setup the docker image.
The docker-compose.yml contains the necessary settings to test p0f using docker-compose. This will ensure to start the docker container with the appropriate permissions and port mappings.