Working with Xprobe2 Tool in Kali Linux
Example 1: List xprobe2 Modules
xprobe2 -L
In this example, we have listed the available modules of Xprobe2 tool.
Example 2: Fingerprint with xprobe2
sudo xprobe2 192.169.144.130
In this example, we are fingerprinting an IP address rather than domain address.
Results of Fingerprinting IP address is displayed below,
Example 3: Fingerprint an Unknown System
sudo xprobe2 google.com
In this example, we are Scanning google.com domain.
We have got the Running OS details along with their Version. This can help in finding exploits.
Example 4: Test Another Public Domain
sudo xprobe2 w3wiki.org
In this example, we are fingerprinting w3wiki.org domain.
We have got the results that displays the OS name and its version.
How to Conduct OS Fingerprinting with Xprobe2
We all have used ping and Nmap tools for active reconnaissance, which gives information about the target domain. But, in this article, we will be exploring one of the best active reconnaissance tools which is Xprobe2. Xprobe2 tool is available in the apt manager of Linux platform OS. It’s free and open-source to use. Xprobe2 tool sends probes to the target system, then estimates the OS from the system’s response. In total, xprobe2 has 16 different modules it runs to help determine the OS. Xprobe2 tool gathers the name of the OS along with its version, which can be beneficial to find the exploits and gain the access to the domain server.
Contact Us