Last Updated: 2014-06-05 14:24:22 UTC
by Richard Porter (Version: 2)
p0f has been discussed from time to time in our diary posts , and I thought it good to bring that tool up again. There is a fully updated version  that has some additional features and seems to be maintained again (hoooray!). In that, there are some great things we can re-visit with the new and improved tool.
In the interest of the 'power' of sharing, to the "Inter-Tubes" for data. "Data, Data, Data" .... Here at the Internet Storm Center we have a saying "Got Packets?" well, in the interest of giving back check out http://www.netresec.com/?page=PcapFiles as a jumping off point for GiGs and GiGs worth of packets. Your mileage on the links may vary as some pcaps are no longer available. Be careful as always, some of that stuff may hurt :)
Checking what version is loaded, 3.06b and to the command line "Batman", let us first take a look at some simple protocol traffic. Mine is a capture from a ... location ... *hint_35K_feet*. If you want to take a look at other PCAPS that can be run through the tool for output check out references , ,  (And I am sure there are others out there, please add in the comments).
p0f -r ./and some results. Lets go over the normal stuff, then get to the good stuff.
If you notice in Figure 1., we see that we can tell a lot about this host, up-time, FREQ of the host, probably a Wifi, iType Device, likely a MacBook Pro (I have the inside scoop on that, it's me :).
For the more interesting part, we have to scroll back up a bit and we find?
According to the readme found at http://lcamtuf.coredump.cx/p0f3/README this is available via API. Just another tool in the belt of the analyst.
For fun, I downloaded a CTF PCAP from ICTF and ran it to see what p0f could find.
--- ISC Handler on Duty