head	1.4;
access;
symbols;
locks; strict;
comment	@# @;


1.4
date	2006.09.30.15.36.00;	author sat;	state dead;
branches;
next	1.3;

1.3
date	2006.09.28.12.54.35;	author sat;	state Exp;
branches;
next	1.2;

1.2
date	2006.08.29.05.03.46;	author sat;	state Exp;
branches;
next	1.1;

1.1
date	2006.08.21.07.46.31;	author sat;	state Exp;
branches;
next	;


desc
@@


1.4
log
@- Separate sinfp into library (p5-Net-SinFP) and binary+db (sinfp)
- Use latest db snapshot
@
text
@MD5 (Net-SinFP-2.02.tar.gz) = 9200a258e3f1e2cde3a57fe483e0c172
SHA256 (Net-SinFP-2.02.tar.gz) = a986a7f548f49a91ba64780e70746c2da5296a13a21282656fae49c50fb461e9
SIZE (Net-SinFP-2.02.tar.gz) = 25218
@


1.3
log
@- Use CPAN version
- Resolve all conflicts
@
text
@@


1.2
log
@- Update to 2.02
@
text
@d1 3
a3 3
MD5 (SinFP-2.02-1.tar.gz) = d7dda953c60563976c02f735416ce70a
SHA256 (SinFP-2.02-1.tar.gz) = cdb8dd727a863456ae1b8c59ddfaeff2421c595b8cf180f12b46c8f9a669b776
SIZE (SinFP-2.02-1.tar.gz) = 2789139
@


1.1
log
@Add port security/sinfp:

SinFP is a new approach to OS fingerprinting, which bypasses
limitations that nmap has.

Nmap approaches to fingerprinting as shown to be efficient for years.
Nowadays, with the omni-presence of stateful filtering devices,
PAT/NAT configurations and emerging packet normalization technologies,
its approach to OS fingerprinting is becoming to be obsolete.

SinFP uses the aforementioned limitations as a basis for tests to be
obsolutely avoided in used frames to identify accurately the remote
operating system. That is, it only requires one open TCP port, sends
only fully standard TCP packets, and limits the number of tests to 2
or 3 (with only 1 test giving the OS reliably in most cases).

WWW: http://www.gomor.org/sinfp
@
text
@d1 3
a3 3
MD5 (SinFP-2.01-1.tar.gz) = e0e9db25030d7517393d9c63c4c4cf2e
SHA256 (SinFP-2.01-1.tar.gz) = 7e1e81498481f157f4cec2bcf6e16f1026c1756ae97442ff54942d9bdb12ff01
SIZE (SinFP-2.01-1.tar.gz) = 2788910
@

