Skip to main content

Xprobe and Nmap Fingerprint Analysis

posted onOctober 31, 2001
by hitbsecnews

I wrote the following to illustrate how easy it is for IDS to identify Nmap OS detection, and the difficulty in detecting Xprobe OS detection.
While Xprobe would be my favorite OS detection tool, a lot of work needs to be done, especially when fingerprinting a give netblock. Xprobe does not ping the target, thus it will send UPD packet to all hosts within the given netblock. This can be used to identify Xprobe (but it is still difficult to distinguish Xprobe from other scanners). When fingerprinting a host that is known to be alive, Xprobe is very efficient and fast, compared to Nmap.

The full article is here.

Source

Tags

Networking

You May Also Like

Recent News

Friday, November 29th

Tuesday, November 19th

Friday, November 8th

Friday, November 1st

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th

Simplenews subscription

Stay informed - subscribe to our newsletter.
The subscriber's email address.
Keeping Knowledge Free for Over a Decade

Copyright © 2018 Hack In The Box. All rights reserved.

36th Floor, Menara Maxis, Kuala Lumpur City Centre 50088 Kuala Lumpur Malaysia
Tel: +603-2615-7299 Fax: +603-2615-0088