切换风格

Wizard Sky California Sunset glow Black Cloud Beige Dragon Lavender NewYear City Snow Flowers London
收藏本站XSS平台字符串转换jsfuck
171 : 网络扫描 xprobe[复制链接]
发表于 2012-10-2 00:47:37 | 显示全部楼层 |!read_mode!
  1. root@Dis9Team:/pen/scanner# apt-get install xprobe
  2. root@Dis9Team:/pen/scanner# xprobe2

  3. Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu

  4. usage: xprobe2 [options] target
  5. Options:
  6.           -v                       Be verbose
  7.           -r                       Show route to target(traceroute)
  8.           -p <proto:portnum:state> Specify portnumber, protocol and state.
  9.                                    Example: tcp:23:open, UDP:53:CLOSED
  10.           -c <configfile>          Specify config file to use.
  11.           -h                       Print this help.
  12.           -o <fname>               Use logfile to log everything.
  13.           -t <time_sec>            Set initial receive timeout or roundtrip time.
  14.           -s <send_delay>          Set packsending delay (milseconds).
  15.           -d <debuglv>             Specify debugging level.
  16.           -D <modnum>              Disable module number <modnum>.
  17.           -M <modnum>              Enable module number <modnum>.
  18.           -L                       Display modules.
  19.           -m <numofmatches>        Specify number of matches to print.
  20.           -T <portspec>            Enable TCP portscan for specified port(s).
  21.                                    Example: -T21-23,53,110
  22.           -U <portspec>            Enable UDP portscan for specified port(s).
  23.           -f                       force fixed round-trip time (-t opt).
  24.           -F                       Generate signature (use -o to save to a file).
  25.           -X                       Generate XML output and save it to logfile specified with -o.
  26.           -B                       Options forces TCP handshake module to try to guess open TCP port
  27.           -A                       Perform analysis of sample packets gathered during portscan in
  28.                                    order to detect suspicious traffic (i.e. transparent proxies,
  29.                                    firewalls/NIDSs resetting connections). Use with -T.
  30. root@Dis9Team:/pen/scanner#
复制代码
多功能网络扫描工具 用法:


  1. root@Dis9Team:/pen/scanner# xprobe2 -v google.com

  2. Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu

  3. [+] Target is google.com
  4. [+] Loading modules.
  5. [+] Following modules are loaded:
  6. [x] [1] ping:icmp_ping  -  ICMP echo discovery module
  7. [x] [2] ping:tcp_ping  -  TCP-based ping discovery module
  8. [x] [3] ping:udp_ping  -  UDP-based ping discovery module
  9. [x] [4] infogather:ttl_calc  -  TCP and UDP based TTL distance calculation
  10. [x] [5] infogather:portscan  -  TCP and UDP PortScanner
  11. [x] [6] fingerprint:icmp_echo  -  ICMP Echo request fingerprinting module
  12. [x] [7] fingerprint:icmp_tstamp  -  ICMP Timestamp request fingerprinting module
  13. [x] [8] fingerprint:icmp_amask  -  ICMP Address mask request fingerprinting module
  14. [x] [9] fingerprint:icmp_port_unreach  -  ICMP port unreachable fingerprinting module
  15. [x] [10] fingerprint:tcp_hshake  -  TCP Handshake fingerprinting module
  16. [x] [11] fingerprint:tcp_rst  -  TCP RST fingerprinting module
  17. [x] [12] fingerprint:smb  -  SMB fingerprinting module
  18. [x] [13] fingerprint:snmp  -  SNMPv2c fingerprinting module
  19. [+] 13 modules registered
  20. [+] Initializing scan engine
  21. [+] Running scan engine
  22. [-] ping:tcp_ping module: no closed/open TCP ports known on 74.125.71.138. Module test failed
  23. [-] ping:udp_ping module: no closed/open UDP ports known on 74.125.71.138. Module test failed
  24. [-] No distance calculation. 74.125.71.138 appears to be dead or no ports known
  25. [+] Host: 74.125.71.138 is up (Guess probability: 50%)
  26. [+] Target: 74.125.71.138 is alive. Round-Trip Time: 0.06093 sec
  27. [+] Selected safe Round-Trip Time value is: 0.12186 sec
  28. [-] fingerprint:tcp_hshake Module execution aborted (no open TCP ports known)
  29. [-] fingerprint:smb need either TCP port 139 or 445 to run
  30. [-] fingerprint:snmp: need UDP port 161 open
  31. [+] Primary guess:
  32. [+] Host 74.125.71.138 Running OS: "Apple Mac OS X 10.3.7" (Guess probability: 100%)
  33. [+] Other guesses:
  34. [+] Host 74.125.71.138 Running OS: "Apple Mac OS X 10.3.8" (Guess probability: 100%)
  35. [+] Host 74.125.71.138 Running OS: "Apple Mac OS X 10.3.9" (Guess probability: 100%)
  36. [+] Host 74.125.71.138 Running OS: "Apple Mac OS X 10.4.0" (Guess probability: 100%)
  37. [+] Host 74.125.71.138 Running OS: "Apple Mac OS X 10.4.1" (Guess probability: 100%)
  38. [+] Host 74.125.71.138 Running OS: "HP JetDirect ROM F.08.08 EEPROM F.08.20" (Guess probability: 100%)
  39. [+] Host 74.125.71.138 Running OS: "HP JetDirect ROM F.08.08 EEPROM F.08.05" (Guess probability: 100%)
  40. [+] Host 74.125.71.138 Running OS: "HP JetDirect ROM F.08.01 EEPROM F.08.05" (Guess probability: 100%)
  41. [+] Host 74.125.71.138 Running OS: "HP JetDirect ROM A.05.03 EEPROM A.05.05" (Guess probability: 100%)
  42. [+] Host 74.125.71.138 Running OS: "HP JetDirect ROM A.03.17 EEPROM A.04.09" (Guess probability: 100%)
  43. [+] Cleaning up scan engine
  44. [+] Modules deinitialized
  45. [+] Execution completed.
  46. root@Dis9Team:/pen/scanner#
复制代码
google的操作系统是:HP JetDirect ROM?


列出全部功能:
  1. root@Dis9Team:/pen/scanner# xprobe2 -L

  2. Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu

  3. Following modules are available (by keyword)
  4. [1] ping:icmp_ping
  5. [2] ping:tcp_ping
  6. [3] ping:udp_ping
  7. [4] infogather:ttl_calc
  8. [5] infogather:portscan
  9. [6] fingerprint:icmp_echo
  10. [7] fingerprint:icmp_tstamp
  11. [8] fingerprint:icmp_amask
  12. [9] fingerprint:icmp_info
  13. [10] fingerprint:icmp_port_unreach
  14. [11] fingerprint:tcp_hshake
  15. [12] fingerprint:tcp_rst
  16. [13] fingerprint:smb
  17. [14] fingerprint:snmp
复制代码
完整扫描
  1. root@Dis9Team:/pen/scanner# xprobe2 -v -r -B -F -T 1-10000 1.1.1.3
复制代码





附件: 你需要登录才可以下载或查看附件。没有帐号?加入Team
操千曲而后晓声,观千剑而后识器。

代码区

GMT+8, 2020-9-28 10:29

Powered by Discuz! X2

© 2001-2018 Comsenz Inc.

回顶部