pf.os revision 1.8
1# $OpenBSD: pf.os,v 1.8 2003/09/05 22:14:14 frantzen Exp $ 2# passive OS fingerprinting 3# ------------------------- 4# 5# SYN signatures. Those signatures work for SYN packets only (duh!). 6# 7# (C) Copyright 2000-2003 by Michal Zalewski <lcamtuf@coredump.cx> 8# (C) Copyright 2003 by Mike Frantzen <frantzen@w4g.org> 9# 10# Permission to use, copy, modify, and distribute this software for any 11# purpose with or without fee is hereby granted, provided that the above 12# copyright notice and this permission notice appear in all copies. 13# 14# THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES 15# WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF 16# MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR 17# ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES 18# WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN 19# ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF 20# OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 21# 22# 23# This fingerprint database is adapted from Michal Zalewski's p0f passive 24# operating system package. 25# 26# 27# Each line in this file specifies a single fingerprint. Please read the 28# information below carefully before attempting to append any signatures 29# reported as UNKNOWN to this file to avoid mistakes. 30# 31# We use the following set metrics for fingerprinting: 32# 33# - Window size (WSS) - a highly OS dependent setting used for TCP/IP 34# performance control (max. amount of data to be sent without ACK). 35# Some systems use a fixed value for initial packets. On other 36# systems, it is a multiple of MSS or MTU (MSS+40). In some rare 37# cases, the value is just arbitrary. 38# 39# NEW SIGNATURE: if p0f reported a special value of 'Snn', the number 40# appears to be a multiple of MSS (MSS*nn); a special value of 'Tnn' 41# means it is a multiple of MTU ((MSS+40)*nn). Unless you notice the 42# value of nn is not fixed (unlikely), just copy the Snn or Tnn token 43# literally. If you know this device has a simple stack and a fixed 44# MTU, you can however multiply S value by MSS, or T value by MSS+40, 45# and put it instead of Snn or Tnn. 46# 47# If WSS otherwise looks like a fixed value (for example a multiple 48# of two), or if you can confirm the value is fixed, please quote 49# it literally. If there's no apparent pattern in WSS chosen, you 50# should consider wildcarding this value. 51# 52# - Overall packet size - a function of all IP and TCP options and bugs. 53# 54# NEW SIGNATURE: Copy this value literally. 55# 56# - Initial TTL - We check the actual TTL of a received packet. It can't 57# be higher than the initial TTL, and also shouldn't be dramatically 58# lower (maximum distance is defined as 40 hops). 59# 60# NEW SIGNATURE: *Never* copy TTL from a p0f-reported signature literally. 61# You need to determine the initial TTL. The best way to do it is to 62# check the documentation for a remote system, or check its settings. 63# A fairly good method is to simply round the observed TTL up to 64# 32, 64, 128, or 255, but it should be noted that some obscure devices 65# might not use round TTLs (in particular, some shoddy appliances use 66# "original" initial TTL settings). If not sure, you can see how many 67# hops you're away from the remote party with traceroute or mtr. 68# 69# - Don't fragment flag (DF) - some modern OSes set this to implement PMTU 70# discovery. Others do not bother. 71# 72# NEW SIGNATURE: Copy this value literally. 73# 74# - Maximum segment size (MSS) - this setting is usually link-dependent. P0f 75# uses it to determine link type of the remote host. 76# 77# NEW SIGNATURE: Always wildcard this value, except for rare cases when 78# you have an appliance with a fixed value, know the system supports only 79# a very limited number of network interface types, or know the system 80# is using a value it pulled out of nowhere. Specific unique MSS 81# can be used to tell Google crawlbots from the rest of the population. 82# 83# - Window scaling (WSCALE) - this feature is used to scale WSS. 84# It extends the size of a TCP/IP window to 32 bits. Some modern 85# systems implement this feature. 86# 87# NEW SIGNATURE: Observe several signatures. Initial WSCALE is often set 88# to zero or other low value. There's usually no need to wildcard this 89# parameter. 90# 91# - Timestamp - some systems that implement timestamps set them to 92# zero in the initial SYN. This case is detected and handled appropriately. 93# 94# - Selective ACK permitted - a flag set by systems that implement 95# selective ACK functionality. 96# 97# - The sequence of TCP all options (MSS, window scaling, selective ACK 98# permitted, timestamp, NOP). Other than the options previously 99# discussed, p0f also checks for timestamp option (a silly 100# extension to broadcast your uptime ;-), NOP options (used for 101# header padding) and sackOK option (selective ACK feature). 102# 103# NEW SIGNATURE: Copy the sequence literally. 104# 105# To wildcard any value (except for initial TTL or TCP options), replace 106# it with '*'. You can also use a modulo operator to match any values 107# that divide by nnn - '%nnn'. 108# 109# Fingerprint entry format: 110# 111# wwww:ttt:D:ss:OOO...:OS:Version:Subtype:Details 112# 113# wwww - window size (can be *, %nnn, Snn or Tnn). The special values 114# "S" and "T" which are a multiple of MSS or a multiple of MTU 115# respectively. 116# ttt - initial TTL 117# D - don't fragment bit (0 - not set, 1 - set) 118# ss - overall SYN packet size 119# OOO - option value and order specification (see below) 120# OS - OS genre (Linux, Solaris, Windows) 121# Version - OS Version (2.0.27 on x86, etc) 122# Subtype - OS subtype or patchlevel (SP3, lo0) 123# details - Generic OS details 124# 125# If OS genre starts with '*', p0f will not show distance, link type 126# and timestamp data. It is useful for userland TCP/IP stacks of 127# network scanners and so on, where many settings are randomized or 128# bogus. 129# 130# If OS genre starts with @, it denotes an approximate hit for a group 131# of operating systems (signature reporting still enabled in this case). 132# Use this feature at the end of this file to catch cases for which 133# you don't have a precise match, but can tell it's Windows or FreeBSD 134# or whatnot by looking at, say, flag layout alone. 135# 136# Option block description is a list of comma or space separated 137# options in the order they appear in the packet: 138# 139# N - NOP option 140# Wnnn - window scaling option, value nnn (or * or %nnn) 141# Mnnn - maximum segment size option, value nnn (or * or %nnn) 142# S - selective ACK OK 143# T - timestamp 144# T0 - timestamp with a zero value 145# 146# To denote no TCP options, use a single '.'. 147# 148# Please report any additions to this file, or any inaccuracies or 149# problems spotted, to the maintainers: lcamtuf@coredump.cx, 150# frantzen@openbsd.org and bugs@openbsd.org with a tcpdump packet 151# capture of the relevant SYN packet(s) 152# 153# WARNING WARNING WARNING 154# ----------------------- 155# 156# Do not add a system X as OS Y just because NMAP says so. It is often 157# the case that X is a NAT firewall. While nmap is talking to the 158# device itself, p0f is fingerprinting the guy behind the firewall 159# instead. 160# 161# When in doubt, use common sense, don't add something that looks like 162# a completely different system as Linux or FreeBSD or LinkSys router. 163# Check DNS name, establish a connection to the remote host and look 164# at SYN+ACK - does it look similar? 165# 166# Some users tweak their TCP/IP settings - enable or disable RFC1323 167# functionality, enable or disable timestamps or selective ACK, 168# disable PMTU discovery, change MTU and so on. Always compare a new rule 169# to other fingerprints for this system, and verify the system isn't 170# "customized" before adding it. It is OK to add signature variants 171# caused by a commonly used software (personal firewalls, security 172# packages, etc), but it makes no sense to try to add every single 173# possible /proc/sys/net/ipv4 tweak on Linux or so. 174# 175# KEEP IN MIND: Some packet firewalls configured to normalize outgoing 176# traffic (OpenBSD pf with "scrub" enabled, for example) will, well, 177# normalize packets. Signatures will not correspond to the originating 178# system (and probably not quite to the firewall either). 179# 180# NOTE: Try to keep this file in some reasonable order, from most to 181# least likely systems. This will speed up operation. Also keep most 182# generic and broad rules near the end. 183# 184 185########################## 186# Standard OS signatures # 187########################## 188 189# ----------------- AIX --------------------- 190 191# AIX is first because its signatures are close to NetBSD, MacOS X and 192# Linux 2.0, but it uses a fairly rare MSSes, at least sometimes... 193# This is a shoddy hack, though. 194 19516384:64:0:44:M512: AIX:4.3:2-3:AIX 4.3.2 and earlier 196 19716384:64:0:60:M512,N,W%2,N,N,T: AIX:4.3:3:AIX 4.3.3-5.2 19816384:64:0:60:M512,N,W%2,N,N,T: AIX:5.1-5.2::AIX 4.3.3-5.2 19932768:64:0:60:M512,N,W%2,N,N,T: AIX:4.3:3:AIX 4.3.3-5.2 20032768:64:0:60:M512,N,W%2,N,N,T: AIX:5.1-5.2::AIX 4.3.3-5.2 20165535:64:0:60:M512,N,W%2,N,N,T: AIX:4.3:3:AIX 4.3.3-5.2 20265535:64:0:60:M512,N,W%2,N,N,T: AIX:5.1-5.2::AIX 4.3.3-5.2 203 204# ----------------- Linux ------------------- 205 206512:64:0:44:M*: Linux:2.0:3x:Linux 2.0.3x 20716384:64:0:44:M*: Linux:2.0:3x:Linux 2.0.3x 208 209S4:64:1:60:M1360,S,T,N,W0: Linux:google::Linux (Google crawlbot) 210 211S3:64:1:60:M*,S,T,N,W0: Linux:2.4:18-21:Linux 2.4.18 and newer 212S4:64:1:60:M*,S,T,N,W0: Linux:2.4::Linux 2.4 213S3:64:1:60:M*,S,T,N,W1: Linux:2.5::Linux 2.5 214S4:64:1:60:M*,S,T,N,W1: Linux:2.5::Linux 2.5 215 216S20:64:1:60:M*,S,T,N,W0: Linux:2.2:20-25:Linux 2.2.20 and newer 217S22:64:1:60:M*,S,T,N,W0: Linux:2.2::Linux 2.2 218S11:64:1:60:M*,S,T,N,W0: Linux:2.2::Linux 2.2 219 220# Popular cluster config scripts disable timestamps and 221# selective ACK: 222S4:64:1:48:M1460,N,W0: Linux:2.4:cluster:Linux 2.4 in cluster 223 224# This needs to be investigated. On some systems, WSS 225# is selected as a multiple of MTU instead of MSS. I got 226# many submissions for this for many late versions of 2.4: 227T4:64:1:60:M1412,S,T,N,W0: Linux:2.4::Linux 2.4 (late, uncommon) 228 229# This happens only over loopback, but let's make folks happy: 23032767:64:1:60:M16396,S,T,N,W0: Linux:2.4:lo0:Linux 2.4 (local) 231S8:64:1:60:M3884,S,T,N,W0: Linux:2.2:lo0:Linux 2.2 (local) 232 233# Opera visitors: 23416384:64:1:60:M*,S,T,N,W0: Linux:2.2:Opera:Linux 2.2 (Opera?) 23532767:64:1:60:M*,S,T,N,W0: Linux:2.4:Opera:Linux 2.4 (Opera?) 236 237# Some fairly common mods: 238# S4:64:1:52:M*,N,N,S,N,W0: Linux:2.4:noTS:Linux 2.4 w/o timestamps 239 240# ----------------- FreeBSD ----------------- 241 24216384:64:1:44:M*: FreeBSD:2.0-2.2::FreeBSD 2.0-4.1 24316384:64:1:44:M*: FreeBSD:3.0-3.5::FreeBSD 2.0-4.1 24416384:64:1:44:M*: FreeBSD:4.0-4.1::FreeBSD 2.0-4.1 24516384:64:1:60:M*,N,W0,N,N,T: FreeBSD:4.4::FreeBSD 4.4 2461024:64:1:60:M*,N,W0,N,N,T: FreeBSD:4.4::FreeBSD 4.4 247 24857344:64:1:44:M*: FreeBSD:4.6-4.8:noRFC1323:FreeBSD 4.6-4.8 (no RFC1323) 24957344:64:1:60:M*,N,W0,N,N,T: FreeBSD:4.6-4.8::FreeBSD 4.6-4.8 250 25165535:64:1:60:M*,N,W0,N,N,T: FreeBSD:4.8-4.9::FreeBSD 4.8-5.0 (or MacOS X) 25265535:64:1:60:M*,N,W0,N,N,T: FreeBSD:5.0::FreeBSD 4.8-5.0 (or MacOS X) 25332768:64:1:60:M*,N,W0,N,N,T: FreeBSD:4.8-4.9::FreeBSD 4.8-5.0 (or MacOS X) 25432768:64:1:60:M*,N,W0,N,N,T: FreeBSD:5.0::FreeBSD 4.8-5.0 (or MacOS X) 255 25665535:48:1:60:M*,N,W1,N,N,T: FreeBSD:5.0-5.1::FreeBSD 5.0-5.1 257 258# 16384:64:1:60:M*,N,N,N,N,N,N,T:FreeBSD:4.4:noTS:FreeBSD 4.4 (w/o timestamps) 259 260# ----------------- NetBSD ------------------ 261 26265535:64:0:60:M*,N,W0,N,N,T0: NetBSD:1.6:opera:NetBSD 1.6 (Opera) 26316384:64:0:60:M*,N,W0,N,N,T0: NetBSD:1.6::NetBSD 1.6 26416384:64:1:60:M*,N,W0,N,N,T0: NetBSD:1.6:df:NetBSD 1.6 (DF) 26516384:64:0:60:M*,N,W0,N,N,T: NetBSD:1.3::NetBSD 1.3 26665535:64:1:60:M*,N,W1,N,N,T0: NetBSD:1.6::NetBSD 1.6W-current (DF) 267 268# ----------------- OpenBSD ----------------- 269 27016384:64:0:60:M*,N,W0,N,N,T: OpenBSD:2.6::NetBSD 1.3 (or OpenBSD 2.6) 27116384:64:1:64:M*,N,N,S,N,W0,N,N,T: OpenBSD:3.0-3.4::OpenBSD 3.0-3.4 27216384:64:0:64:M*,N,N,S,N,W0,N,N,T: OpenBSD:3.0-3.4:no-df:OpenBSD 3.0-3.4 (scrub no-df) 27357344:64:1:64:M*,N,N,S,N,W0,N,N,T: OpenBSD:3.3-3.4::OpenBSD 3.3-3.4 27457344:64:0:64:M*,N,N,S,N,W0,N,N,T: OpenBSD:3.3-3.4:no-df:OpenBSD 3.3-3.4 (scrub no-df) 275 27665535:64:1:64:M*,N,N,S,N,W0,N,N,T: OpenBSD:3.0-3.4:opera:OpenBSD 3.0-3.4 (Opera) 277 278# ----------------- Solaris ----------------- 279 280S17:64:1:64:N,W3,N,N,T0,N,N,S,M*: Solaris:8:RFC1323:Solaris 8 RFC1323 281S17:64:1:48:N,N,S,M*: Solaris:8::Solaris 8 282S34:64:1:48:M*,N,N,S: Solaris:9::Solaris 9 283 284S23:255:1:44:M*: Solaris:2.5:1:Solaris 2.5.1 285S17:255:1:44:M*: Solaris:2.5-2.7::Solaris 2.5 to 7 286S6:255:1:44:M*: Solaris:2.6-2.7::Solaris 2.6 to 7 287 288# ----------------- IRIX -------------------- 289 29049152:64:0:44:M*: IRIX:6.4::IRIX 6.4 29161440:64:0:44:M*: IRIX:6.2-6.5::IRIX 6.2-6.5 29249152:64:0:52:M*,N,W2,N,N,S: IRIX:6.5:RFC1323:IRIX 6.5 (RFC1323) 29349152:64:0:52:M*,N,W3,N,N,S: IRIX:6.5:RFC1323:IRIX 6.5 (RFC1323) 294 29561440:64:0:48:M*,N,N,S: IRIX:6.5:12:IRIX 6.5.12 29649152:64:0:48:M*,N,N,S: IRIX:6.5:15-21:IRIX 6.5.15 - 6.5.21 297 298# ----------------- Tru64 ------------------- 299 30032768:64:1:48:M*,N,W0: Tru64:4.0f::Tru64 4.0f 30132768:64:0:48:M*,N,W0: Tru64:5.0::Tru64 5.0 302# This looks awfully Linuxish :/ 303# S22:64:0:60:M*,S,T,N,W0: Tru64:5.0:a:Tru64 5.0a 30461440:64:0:48:M*,N,W0: Tru64:5.1a:JP4:Tru64 v5.1a JP4 (or OpenVMS 7.2 on Compaq 5.1 stack) 305 306 307# ----------------- OpenVMS ----------------- 308 3096144:64:1:60:M*,N,W0,N,N,T: OpenVMS:7.2::OpenVMS 7.2 (Multinet 4.4 stack) 310 311# ----------------- MacOS ------------------- 312 31316616:255:1:48:M*,W0: MacOS:7.3-7.6:OTTCP:MacOS 7.3-8.6 (OTTCP) 31416616:255:1:48:M*,W0: MacOS:8.0-8.6:OTTCP:MacOS 7.3-8.6 (OTTCP) 31532768:255:1:48:M*,W0,N: MacOS:9.1-9.2::MacOS 9.1/9.2 31632768:64:0:60:M*,N,W0,N,N,T: MacOS:X:10.2:MacOS X 10.2 317 318# ----------------- Windows ----------------- 319 320# Windows 98 had a plenty of signatures depending on 321# release, but I don't have all the data. 322 323S44:64:1:48:N,N,S,M*: Windows:98:SE:Windows 98SE 324S6:128:1:48:M*: Windows:98:noSACK:Windows 98 (no sack) 3258192:128:1:48:M*,N,N,S: Windows:98::Windows 98 32637300:64:1:48:M*,N,N,S: Windows:98::Windows 98 3278192:128:1:44:M*: Windows:NT:4.0:Windows NT 4.0 328 329 330%8192:128:1:48:M*,N,N,S: Windows:XP::Windows XP/2000 331%8192:128:1:48:M*,N,N,S: Windows:2000P::Windows XP/2000 33265535:128:1:48:M*,N,N,S: Windows:2000:SP4:Windows 2000 SP4 333S44:128:1:48:M*,N,N,S: Windows:XP::Windows XP or 2000 SP3+ 334S44:128:1:48:M*,N,N,S: Windows:2000:SP3:Windows XP or 2000 SP3+ 335S6:128:1:48:M*,N,N,S: Windows:XP::Windows XP or 2000 SP3 336S6:128:1:48:M*,N,N,S: Windows:2000:SP3:Windows XP or 2000 SP3 337 338# This block yet to be verified 339S45:128:1:48:M*,N,N,S: @Windows:XP::Windows XP 340S46:128:1:48:M*,N,N,S: @Windows:XP::Windows XP 341 34232767:128:1:52:M*,N,W0,N,N,S: Windows:NT4::Windows NT4 3436144:128:1:52:M*,N,W0,N,N,S: Windows:NT4::Windows NT4 344S45:128:1:52:M*,N,W0,N,N,S: Windows:2000:SP3:Windows 2000 SP3 345 34664512:128:1:48:M*,N,N,S: Windows:XP::Windows XP/2000 34764512:128:1:48:M*,N,N,S: Windows:2000::Windows XP/2000 348S52:128:1:48:M1260,N,N,S: Windows:XP:Cisco VPN:Windows XP/2000 via Cisco VPN Adapter 349S52:128:1:48:M1260,N,N,S: Windows:2000:Cisco VPN:Windows XP/2000 via Cisco VPN Adapter 350 351# Odds, ends, mods. Advanced Networking Pack turns out to be 352# responsible for enabling RFC1323, System Mechanic also messes 353# with TTLs and timestamps: 354 355*:128:1:64:M*,N,W2,N,N,T0,N,N,S: Windows:2000:SP4:Windows 2000 SP4 (AdvNetPack) or PalmPC 356S4:128:1:48:M*,N,N,S: Windows:2000:SP3:Windows 2000 SP3 (NetTweak) 357S44:128:1:64:M*,N,W0,N,N,T0,N,N,S: Windows:XP:AdvNetPack:Windows XP (AdvNetPack) 35858944:64:1:52:M*,N,W2,N,N,S: Windows:XP:system mechanic:Windows XP (System Mechanic tuned) 359 360# ----------------- HP/UX ------------------- 361 36232768:64:1:44:M*: HP-UX:B.10.20::HP-UX B.10.20 36332768:64:0:48:M*,W0,N: HP-UX:11.0::HP-UX 11.0 36432768:64:1:48:M*,W0,N: HP-UX:11.10-11.11::HP-UX 11.0 or 11.11 365 366# Whoa. Hardcore WSS. 3670:64:0:48:M*,W0,N: HP-UX:B.11.00:A:HP-UX B.11.00 A (RFC1323) 368 369 370# ----------------- SCO ------------------ 371S17:64:1:44:M1460: SCO:Unixware:7.0:SCO Unixware 7.0.0 or OpenServer 5.0.4-5.06 372S17:64:1:44:M1460: SCO:OpenServer:5.0:SCO Unixware 7.0.0 or OpenServer 5.0.4-5.06 373 374# ----------------- RiscOS ------------------ 375 376# We don't yet support the ?12 TCP option 377#16384:64:1:68:M1460,N,W0,N,N,T,N,N,?12: RISCOS:3.70::RISC OS 3.70 378 379# ----------------- BSD/OS ------------------ 380 381# Once again, power of two WSS is also shared by MacOS X with DF set 3828192:64:1:60:M1460,N,W0,N,N,T: BSD/OS:3.1::BSD/OS 3.1-4.3 3838192:64:1:60:M1460,N,W0,N,N,T: BSD/OS:4.0-4.3::BSD/OS 3.1-4.3 384 385 386# ---------------- NewtonOS ----------------- 387 3884096:64:0:44:M1420: NewtonOS:2.1::NewtonOS 2.1 389 390# ---------------- NeXTSTEP ----------------- 391 392S8:64:0:44:M512: NeXTSTEP:3.3::NeXTSTEP 3.3 393 394# ------------------ BeOS ------------------- 395 3961024:255:0:48:M*,N,W0: BeOS:5.0-5.1::BeOS 5.0-5.1 39712288:255:0:44:M1402: BeOS:5.0:3:BeOS 5.0.3 398 399# ------------------ OS/400 ----------------- 400 4018192:64:1:60:M1440,N,W0,N,N,T: OS/400:V4R4M000:L00:OS/400 V4R4M000 L00 402 403# ------------------ ULTRIX ----------------- 404 40516384:64:0:40:.: ULTRIX:4.5::ULTRIX 4.5 406 407# ------------------- DOS ------------------- 408 4092048:255:0:44:M536: DOS:WATTCP:1.05:DOS Arachne via WATTCP/1.05 410 411########################################### 412# Appliance / embedded / other signatures # 413########################################### 414 415# ---------- Firewalls / routers ------------ 416 417S12:64:1:44:M1460: @Checkpoint:::Checkpoint (unknown 1) 418S12:64:1:48:N,N,S,M1460: @Checkpoint:::Checkpoint (unknown 2) 4194096:32:0:44:M1460: ExtremeWare:4.x::ExtremeWare 4.x 42060352:64:0:52:M1460,N,W2,N,N,S: Clavister:7.03.01::Clavister firewall 7.03.01 421 422# ------- Switches and other stuff ---------- 423 4244128:255:0:44:M*: Cisco:::Cisco Catalyst 3500, 7500 etc 42560352:128:1:64:M1460,N,W2,N,N,T,N,N,S: Alteon:ACEswitch::Alteon ACEswitch 426 427# ---------- Caches and whatnots ------------ 428 429S4:64:1:52:M1460,N,N,S,N,W0: AOL:web cache::AOL web cache 430 43132850:64:1:64:N,W1,N,N,T,N,N,S,M*: NetApp:5.x::NetApp Data OnTap 5.x 43216384:64:1:64:M1460,N,N,S,N,W0,N: NetApp:5.3:1:NetApp 5.3.1 43365535:64:0:64:M1460,N,N,S,N,W3,N,N,T: NetApp:5.3:1:NetApp 5.3.1 43465535:64:0:60:M1460,N,W0,N,N,T: NetApp:CacheFlow::NetApp CacheFlow 4358192:64:1:64:M1460,N,N,S,N,W0,N,N,T: NetApp:5.2:1:NetApp NetCache 5.2.1 436 437S4:64:0:48:M1460,N,N,S: Cisco:Content Engine::Cisco Content Engine 438 43927085:128:0:40:.: Dell:PowerApp cache::Dell PowerApp (Linux-based) 440 44165535:255:1:48:N,W1,M1460: Inktomi:crawler::Inktomi crawler 442 44316384:255:0:40:.: Proxyblocker:::Proxyblocker (what's this?) 444 445# ----------- Embedded systems -------------- 446 447S9:255:0:44:M536: PalmOS:Tungsten:C:PalmOS Tungsten C 448S5:255:0:44:M536: PalmOS:3::PalmOS 3/4 449S5:255:0:44:M536: PalmOS:4::PalmOS 3/4 450S4:255:0:44:M536: PalmOS:3:5:PalmOS 3.5 451 452S23:64:1:64:N,W1,N,N,T,N,N,S,M1460: SymbianOS:7::SymbianOS 7 4538192:255:0:44:M1460: SymbianOS:6048::SymbianOS 6048 (on Nokia 7650?) 454 455# Perhaps S4? 4565840:64:1:60:M1452,S,T,N,W1: Zaurus:3.10::Zaurus 3.10 457 45832768:128:1:64:M1460,N,W0,N,N,T0,N,N,S: PocketPC:2002::PocketPC 2002 459 460S1:255:0:44:M346: Contiki:1.1:rc0:Contiki 1.1-rc0 461 462 463 464#################### 465# Fancy signatures # 466#################### 467 4681024:64:0:40:.: *NMAP:syn scan:1:NMAP syn scan (1) 4692048:64:0:40:.: *NMAP:syn scan:2:NMAP syn scan (2) 4703072:64:0:40:.: *NMAP:syn scan:3:NMAP syn scan (3) 4714096:64:0:40:.: *NMAP:syn scan:4:NMAP syn scan (4) 472 4731024:64:0:60:W10,N,M265,T: *NMAP:OS:1:NMAP OS detection probe (1) 4742048:64:0:60:W10,N,M265,T: *NMAP:OS:2:NMAP OS detection probe (2) 4753072:64:0:60:W10,N,M265,T: *NMAP:OS:3:NMAP OS detection probe (3) 4764096:64:0:60:W10,N,M265,T: *NMAP:OS:4:NMAP OS detection probe (4) 477 478##################################### 479# Generic signatures - just in case # 480##################################### 481 482#*:64:1:60:M*,N,W*,N,N,T: @FreeBSD:4.0-4.9::FreeBSD 4.x/5.x 483#*:64:1:60:M*,N,W*,N,N,T: @FreeBSD:5.0-5.1::FreeBSD 4.x/5.x 484 485