Skip to content
Related Articles

Related Articles

Improve Article
Save Article
Like Article

How to Conduct OS Fingerprinting with Xprobe2

  • Last Updated : 10 Oct, 2021

We all have used ping and Nmap tools for active reconnaissance, which gives information about the target domain. But, in this article, we will be exploring one of the best active reconnaissance tools which is Xprobe2. Xprobe2 tool is available in the apt manager of Linux platform OS. It’s free and open-source to use. Xprobe2 tool sends probes to the target system, then estimates the OS from the system’s response. In total, xprobe2 has 16 different modules it runs to help determine the OS. Xprobe2 tool gathers the name of the OS along with its version, which can be beneficial to find the exploits and gain the access to the domain server.

Installation of Xprobe2 Tool in Kali Linux

Step 1: Update the Package lists using the following command.

sudo apt update

Step 2: Install Xprobe2 using apt manager. Use the following command.

sudo apt-get install xprobe2



Step 3: Check the help page for Xprobe2 tool for better understanding. Use the following command.

xprobe2 --help

Working with Xprobe2 Tool in Kali Linux

Example 1: List xprobe2 Modules

xprobe2 -L

In this example, we have listed the available modules of Xprobe2 tool.

Example 2: Fingerprint with xprobe2

sudo xprobe2 192.169.144.130

In this example, we are fingerprinting an IP address rather than domain address.



Results of Fingerprinting IP address is displayed below,

Example 3: Fingerprint an Unknown System

sudo xprobe2 google.com

In this example, we are Scanning google.com domain.

We have got the Running OS details along with their Version. This can help in finding exploits.

Example 4: Test Another Public Domain

sudo xprobe2 geeksforgeeks.org

In this example, we are fingerprinting geeksforgeeks.org domain.

We have got the results that displays the OS name and its version.

My Personal Notes arrow_drop_up
Recommended Articles
Page :

Start Your Coding Journey Now!