Passive TCP fingerprint

Passive TCP fingerprint

  • Documentation
  • GitHub

Passive TCP fingerprintA Rust library for passive traffic fingerprinting

Documentation
View on GitHub

Version

This passive TCP fingerprint library uses pnet and httparse libraries to analyze and parse TCP packets to capture HTTP traffic.
This library is inspired by the well-known p0f tool for passive OS fingerprinting, which identifies the operating systems and network characteristics of remote hosts based on the analysis of TCP packet headers.
The pnet library is employed to process and examine raw TCP packets, while httparse is used to parse the HTTP data within the packets, enabling passive fingerprinting of HTTP traffic without directly interacting with the network. This allows for efficient monitoring and analysis of network behavior in a passive manner. Project is under active development. Feedback and contributions welcome.

Getting Started

To get started with Cargo, simply add the following line to your Cargo.toml file.

[dependencies]
passivetcp-rs = "1.0.0"

For changes, refer to the release notes.


Passive TCP Fingerprinting Based on p0f