fbf9768fcf
-- The Siphon Project is a portable passive network mapping suite. In the latest public version, Siphon passively maps TCP ports and performs passive operating system detection. Through the magic of RFC ambiguity and programmer uniqueness, different machines exhibit telltale characteristics that enable Siphon to make a fairly accurate guess at what operating system is running on machines sending packets out over the wire. The beauty of this method is that our tool does not need to send out a slew of non-RFC compliant packets that trip intrusion detection systems. In fact, we send out no packets at all. Whereas nmap crashes some machines and network hardware when performing its active OS detection tests, Siphon would never crash remote machines. Siphon is available for UNIX and Win32. WWW: http://www.gravitino.net/projects/siphon/ Submitted by Jason Peel <jsyn@nthought.com>
13 lines
472 B
Plaintext
13 lines
472 B
Plaintext
$OpenBSD: patch-log_c,v 1.1.1.1 2001/06/16 14:56:26 lebel Exp $
|
|
--- log.c.orig Fri Jun 15 18:36:47 2001
|
|
+++ log.c Fri Jun 15 18:36:55 2001
|
|
@@ -137,7 +137,7 @@ char *oslookup(int window, int ttl, int
|
|
FILE *osprints;
|
|
static char line[80], *oswin, *osttl, *osdf, *os, hexed[10];
|
|
static int check = 0;
|
|
- osprints = fopen("osprints.conf","r");
|
|
+ osprints = fopen(SYSCONFDIR "/osprints.conf","r");
|
|
|
|
if(!osprints) {
|
|
perror("Unable to find osprints.conf\n");
|