How to Conduct OS Fingerprinting with Xprobe2
We all have used ping and Nmap tools for active reconnaissance, which gives information about the target domain. But, in this article, we will be exploring one of the best active reconnaissance tools which is Xprobe2. Xprobe2 tool is available in the apt manager of Linux platform OS. It’s free and open-source to use. Xprobe2 tool sends probes to the target system, then estimates the OS from the system’s response. In total, xprobe2 has 16 different modules it runs to help determine the OS. Xprobe2 tool gathers the name of the OS along with its version, which can be beneficial to find the exploits and gain the access to the domain server.
Installation of Xprobe2 Tool in Kali Linux
Step 1: Update the Package lists using the following command.
sudo apt update
Step 2: Install Xprobe2 using apt manager. Use the following command.
sudo apt-get install xprobe2
Step 3: Check the help page for Xprobe2 tool for better understanding. Use the following command.
Working with Xprobe2 Tool in Kali Linux
Example 1: List xprobe2 Modules
In this example, we have listed the available modules of Xprobe2 tool.
Example 2: Fingerprint with xprobe2
sudo xprobe2 126.96.36.199
In this example, we are fingerprinting an IP address rather than domain address.
Results of Fingerprinting IP address is displayed below,
Example 3: Fingerprint an Unknown System
sudo xprobe2 google.com
In this example, we are Scanning google.com domain.
We have got the Running OS details along with their Version. This can help in finding exploits.
Example 4: Test Another Public Domain
sudo xprobe2 geeksforgeeks.org
In this example, we are fingerprinting geeksforgeeks.org domain.
We have got the results that displays the OS name and its version.