Xprobe2

Description

Xprobe2 is an active operating system fingerprinting tool with a different approach to operating system fingerprinting. xprobe2 relies on fuzzy signature matching, probabilistic guesses, multiple matches simultaneously, and a signature database.

Usage

Syntax

xprobe2 [options] target

Options

          -v                       Be verbose
          -r                       Show route to target(traceroute)
          -p <proto:portnum:state> Specify portnumber, protocol and state.
                                   Example: tcp:23:open, UDP:53:CLOSED
          -c <configfile>          Specify config file to use.
          -h                       Print this help.
          -o <fname>               Use logfile to log everything.
          -t <time_sec>            Set initial receive timeout or roundtrip time.
          -s <send_delay>          Set packsending delay (milseconds).
          -d <debuglv>             Specify debugging level.
          -D <modnum>              Disable module number <modnum>.
          -M <modnum>              Enable module number <modnum>.
          -L                       Display modules.
          -m <numofmatches>        Specify number of matches to print.
          -T <portspec>            Enable TCP portscan for specified port(s).
                                   Example: -T21-23,53,110
          -U <portspec>            Enable UDP portscan for specified port(s).
          -f                       force fixed round-trip time (-t opt).
          -F                       Generate signature (use -o to save to a file).
          -X                       Generate XML output and save it to logfile specified with -o.
          -B                       Options forces TCP handshake module to try to guess open TCP port
          -A                       Perform analysis of sample packets gathered during portscan in
                                   order to detect suspicious traffic (i.e. transparent proxies,
                                   firewalls/NIDSs resetting connections). Use with -T.

Example

To know OS and also is system alive 

Syntax – xprobe2 Target IP/Hostname

Exxprobe2 192.168.1.4

cyborg@cyborg:~$ sudo xprobe2 192.168.1.4
[sudo] password for cyborg: 

Xprobe-ng v.2.1 Copyright (c) 2002-2009 [email protected], [email protected], [email protected]

[+] Target is 192.168.1.4
[+] Loading modules.
[+] Following modules are loaded:
[x]  ping:icmp_ping  -  ICMP echo discovery module
[x]  ping:tcp_ping  -  TCP-based ping discovery module
[x]  ping:udp_ping  -  UDP-based ping discovery module
[x]  infogather:ttl_calc  -  TCP and UDP based TTL distance calculation
[x]  infogather:portscan  -  TCP and UDP PortScanner
[x]  fingerprint:icmp_echo  -  ICMP Echo request fingerprinting module
[x]  fingerprint:icmp_tstamp  -  ICMP Timestamp request fingerprinting module
[x]  fingerprint:icmp_amask  -  ICMP Address mask request fingerprinting module
[x]  fingerprint:icmp_info  -  ICMP Information request fingerprinting module
[x]  fingerprint:icmp_port_unreach  -  ICMP port unreachable fingerprinting module
[x]  fingerprint:tcp_hshake  -  TCP Handshake fingerprinting module
[x]  fingerprint:tcp_rst  -  TCP RST fingerprinting module
[x]  app:smb  -  SMB fingerprinting module
[x]  app:snmp  -  SNMPv2c fingerprinting module
[x]  app:ftp  -  FTP fingerprinting tests
[x]  app:http  -  HTTP fingerprinting tests
[+] 16 modules registered
[+] Initializing scan engine
[+] Running scan engine
fingerprint:icmp_tstamp has not enough data
Executing ping:icmp_ping
Executing fingerprint:icmp_port_unreach
Executing fingerprint:icmp_echo
Executing fingerprint:tcp_rst
fingerprint:tcp_hshake has not enough data
Executing fingerprint:icmp_amask
Executing fingerprint:icmp_info
Executing fingerprint:icmp_tstamp
app:smb has not enough data
Executing app:snmp
ping:tcp_ping has not enough data
ping:udp_ping has not enough data
infogather:ttl_calc has not enough data
Executing infogather:portscan
Executing app:ftp
Executing app:http
[+] Primary Network guess:
[+] Host 192.168.1.4 Running OS: "Microsoft Windows XP SP2" (Guess probability: 93%)
[+] Other guesses:
[+] Host 192.168.1.4 Running OS: "Microsoft Windows 2000 Workstation SP1" (Guess probability: 93%)
[+] Host 192.168.1.4 Running OS: "Microsoft Windows 2000 Workstation SP2" (Guess probability: 93%)
[+] Host 192.168.1.4 Running OS: "Microsoft Windows 2000 Workstation SP3" (Guess probability: 93%)
[+] Host 192.168.1.4 Running OS: "Microsoft Windows 2003 Server Standard Edition" (Guess probability: 93%)
[+] Host 192.168.1.4 Running OS: "Microsoft Windows 2003 Server Enterprise Edition" (Guess probability: 93%)
[+] Host 192.168.1.4 Running OS: "Microsoft Windows XP SP1" (Guess probability: 93%)
[+] Host 192.168.1.4 Running OS: "Microsoft Windows XP" (Guess probability: 93%)
[+] Host 192.168.1.4 Running OS: "Microsoft Windows 2000 Server Service Pack 4" (Guess probability: 93%)
[+] Host 192.168.1.4 Running OS: "Microsoft Windows 2000 Server Service Pack 3" (Guess probability: 93%)
[+] Cleaning up scan engine
[+] Modules deinitialized
[+] Execution completed.

Search a domain

Ex xprobe2 ztrela.com

cyborg@cyborg:~$ sudo xprobe2 ztrela.com

Xprobe-ng v.2.1 Copyright (c) 2002-2009 [email protected], [email protected], [email protected]

[+] Target is ztrela.com
[+] Loading modules.
[+] Following modules are loaded:
[x]  ping:icmp_ping  -  ICMP echo discovery module
[x]  ping:tcp_ping  -  TCP-based ping discovery module
[x]  ping:udp_ping  -  UDP-based ping discovery module
[x]  infogather:ttl_calc  -  TCP and UDP based TTL distance calculation
[x]  infogather:portscan  -  TCP and UDP PortScanner
[x]  fingerprint:icmp_echo  -  ICMP Echo request fingerprinting module
[x]  fingerprint:icmp_tstamp  -  ICMP Timestamp request fingerprinting module
[x]  fingerprint:icmp_amask  -  ICMP Address mask request fingerprinting module
[x]  fingerprint:icmp_info  -  ICMP Information request fingerprinting module
[x]  fingerprint:icmp_port_unreach  -  ICMP port unreachable fingerprinting module
[x]  fingerprint:tcp_hshake  -  TCP Handshake fingerprinting module
[x]  fingerprint:tcp_rst  -  TCP RST fingerprinting module
[x]  app:smb  -  SMB fingerprinting module
[x]  app:snmp  -  SNMPv2c fingerprinting module
[x]  app:ftp  -  FTP fingerprinting tests
[x]  app:http  -  HTTP fingerprinting tests
[+] 16 modules registered
[+] Initializing scan engine
[+] Running scan engine
fingerprint:icmp_tstamp has not enough data
Executing ping:icmp_ping
Executing fingerprint:icmp_port_unreach
Executing fingerprint:icmp_echo
fingerprint:tcp_hshake has not enough data
Executing fingerprint:tcp_rst
Executing fingerprint:icmp_tstamp
Executing fingerprint:icmp_amask
Executing fingerprint:icmp_info
app:smb has not enough data
Executing app:snmp
ping:tcp_ping has not enough data
ping:udp_ping has not enough data
infogather:ttl_calc has not enough data
Executing infogather:portscan
Executing app:ftp
Executing app:http
[+] Primary Network guess:
[+] Host 43.225.55.204 Running OS: "Foundry Networks IronWare Version 03.0.01eTc1" (Guess probability: 100%)
[+] Other guesses:
[+] Host 43.225.55.204 Running OS: "Linux Kernel 2.4.23" (Guess probability: 93%)
[+] Host 43.225.55.204 Running OS: "Linux Kernel 2.6.1" (Guess probability: 93%)
[+] Host 43.225.55.204 Running OS: "Linux Kernel 2.4.21" (Guess probability: 93%)
[+] Host 43.225.55.204 Running OS: "Linux Kernel 2.4.19" (Guess probability: 93%)
[+] Host 43.225.55.204 Running OS: "Linux Kernel 2.6.5" (Guess probability: 93%)
[+] Host 43.225.55.204 Running OS: "Foundry Networks IronWare Version 07.5.04T53" (Guess probability: 93%)
[+] Host 43.225.55.204 Running OS: "Foundry Networks IronWare 07.7.01eT53" (Guess probability: 93%)
[+] Host 43.225.55.204 Running OS: "Apple Mac OS X 10.5" (Guess probability: 93%)
[+] Host 43.225.55.204 Running OS: "Linux Kernel 2.0.36" (Guess probability: 93%)
[+] Cleaning up scan engine
[+] Modules deinitialized
[+] Execution completed.
0 Comments

Leave a reply

CONTACT US

We're are building as a community and a team. Be a part of it.

Sending

©2017 Ztrela Knowledge Solutions Pvt. Ltd

Log in with your credentials

Forgot your details?