tpotce/docker/p0f
2019-10-15 07:49:30 +00:00
..
docs
tools
alloc-inl.h
api.c
api.h
build.sh
config.h
debug.h
docker-compose.yml cleanup 2019-02-28 15:01:12 +00:00
Dockerfile
fp_http.c
fp_http.h
fp_mtu.c
fp_mtu.h
fp_tcp.c
fp_tcp.h
hash.h
languages.h
Makefile
p0f.c
p0f.fp
p0f.h
process.c
process.h
readfp.c
readfp.h
README.md
tcp.h
types.h

p0f

p0f P0f is a tool that utilizes an array of sophisticated, purely passive traffic fingerprinting mechanisms to identify the players behind any incidental TCP/IP communications (often as little as a single normal SYN) without interfering in any way.

This dockerized version is part of the T-Pot community honeypot of Deutsche Telekom AG.

The Dockerfile contains the blueprint for the dockerized p0f and will be used to setup the docker image.

The docker-compose.yml contains the necessary settings to test p0f using docker-compose. This will ensure to start the docker container with the appropriate permissions and port mappings.