Kali p0f的用法

root@kali:~# p0f -i eth0 -p

.-[ 10.133.1.110/35633 -> 121.42.140.156/22 (syn) ]-
|
| client   = 10.133.1.110/35633
| app      = NMap OS detection
| dist     = <= 25
| params   = random_ttl
| raw_sig  = 4:39+25:0:1460:3,10:ws,nop,mss,sok,nop,nop:ecn,uptr+:0
|
`----

.-[ 10.133.1.110/35638 -> 121.42.140.156/1 (syn) ]-
|
| client   = 10.133.1.110/35638
| app      = NMap OS detection
| dist     = <= 8
| params   = random_ttl
| raw_sig  = 4:56+8:0:265:31337,10:ws,nop,mss,ts,sok:ack+:0

posted @ 2020-04-06 21:46  Cyber-insight  阅读(716)  评论(0)    收藏  举报