It's a good idea for a network security pro to know how to validate which endpoints are establishing connections to key enterprise systems, and passive fingerprinting is a great way to find out.
P0f is a free collection of passive OS fingerprinting tools
Requires Free Membership to View
Want more demos of free security tools? Visit our screencast page.
About the presenter:
Peter Giannoulis, GSEC, GCIH, GCIA, GCFA, GCFW, GREM, CISSP, is an information security
consultant in Toronto, Ontario. He currently maintains The Academy Pro, which provides streaming
video for enterprises and consumers on how to configure and troubleshoot many of today's top
security products. He also serves as a technical director for GIAC.
This was first published in January 2011
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation