From 39341e699286bee0f25274e48cc5205d96018c16 Mon Sep 17 00:00:00 2001 From: Giga1699 Date: Fri, 7 Feb 2014 10:12:48 -0500 Subject: [PATCH] Added xprobe2 --- tools/xprobe2.md | 43 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 43 insertions(+) create mode 100644 tools/xprobe2.md diff --git a/tools/xprobe2.md b/tools/xprobe2.md new file mode 100644 index 0000000..9ff775e --- /dev/null +++ b/tools/xprobe2.md @@ -0,0 +1,43 @@ +# xprobe2 + +Notes +------- + +Help Text +------- +``` +Xprobe2 v.0.3 Copyright (c) 2002-2005 fyodor@o0o.nu, ofir@sys-security.com, meder@o0o.nu + +usage: xprobe2 [options] target +Options: + -v Be verbose + -r Show route to target(traceroute) + -p Specify portnumber, protocol and state. + Example: tcp:23:open, UDP:53:CLOSED + -c Specify config file to use. + -h Print this help. + -o Use logfile to log everything. + -t Set initial receive timeout or roundtrip time. + -s Set packsending delay (milseconds). + -d Specify debugging level. + -D Disable module number . + -M Enable module number . + -L Display modules. + -m Specify number of matches to print. + -T Enable TCP portscan for specified port(s). + Example: -T21-23,53,110 + -U Enable UDP portscan for specified port(s). + -f force fixed round-trip time (-t opt). + -F Generate signature (use -o to save to a file). + -X Generate XML output and save it to logfile specified with -o. + -B Options forces TCP handshake module to try to guess open TCP port + -A Perform analysis of sample packets gathered during portscan in + order to detect suspicious traffic (i.e. transparent proxies, + firewalls/NIDSs resetting connections). Use with -T. +``` + +Example Usage +------- + +Links +-------