Xprobe 0.0.1p1From: Ofir Arkin (firstname.lastname@example.org)
- Previous message: Kimberly Anne McKinnis: "Re: Win32.Sircam.Worm Alert....."
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ]
From: "Ofir Arkin" <email@example.com> To: "VULN-DEV" <VULN-DEV@SECURITYFOCUS.COM> Subject: Xprobe 0.0.1p1 Date: Tue, 24 Jul 2001 22:04:06 +0200 Message-ID: <000401c1147b$cdf12370$01000001@godfather>
Xprobe written and maintained by Fyodor Yarochkin
<firstname.lastname@example.org> and Ofir Arkin <email@example.com>, is a
simple, fast, and efficient remote active operating system
fingerprinting tool based on Ofir Arkin's research with the "ICMP
Protocol Usage in Scanning".
A white paper on Xprobe will be published soon. In the mean time you can
download one of the following presentations titled "X - Playing Tricks
with ICMP" given at the last Black Hat Briefings, and Defcon 9.
You can download Ofir Arkin's presentation [.ppt format] given at the
Black Hat Briefings July 2001, from:
You can download Ofir Arkin's presentation [.ppt format] given at Defcon
9 July 2001, from:
FreeBSD 4.x (primary development platform)
Sun Solaris 2.x
Other Platforms? Testing, and feedback is welcomed
Copyright (C) 2001 Fyodor Yarochkin, Ofir Arkin.
This program is free software; you can redistribute it and/or modify it
under the terms of the GNU General Public License as published by the
Free Software Foundation; either version 2 of the License, or (at your
option) any later version.
All material for nonprofit, educational use only.
This program is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General
Public License for more details.
You should have received a copy of the GNU General Public License along
with this program; if not, write to the Free Software Foundation, Inc.,
59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
x [options] hostname (and watch the output)
-h [guess?!] :)
-v be verbose
-i <interface> run on interface (needed if wrong interface is chosen)
-p <portnum> use <portnum> udp port for udp probe.
X Official Home