lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <FFCFE270-FD90-11D7-9576-000393AF8FF2@sys-security.com>
Date: Mon, 13 Oct 2003 17:22:03 +0200
From: Ofir Arkin <ofir@...-security.com>
To: bugtraq <bugtraq@...urityfocus.com>
Subject: Tool Release: Xprobe2 0.2


We are pleased to announce the immediate availability of Xprobe2 v0.2,  
which has been officially released at the Blackhat Federal 2003.

Xprobe2 is a remote active operating system fingerprinting tool with a  
different approach to operating system fingerprinting. Information on  
Xprobe2’s technology can be obtained from [1], [2], and [3].

The new version of Xprobe2 introduces enhancements and advancements in  
Xprobe2’s development.

Xprobe2 now supports:

- Automatic Signature Generation
- XML based output
- The TCP Options Timestamp Fingerprinting method (first to be  
introduced at Blackhat USA 2003)


The source code of Xprobe2 v0.2 can be found at:
http://www.sys-security.com/archive/tools/xprobe2/xprobe2-0.2.tar.gz

MD5 (xprobe2-0.2.tar.gz) = ca723a7e4c8c5001191efdb43e63bbee
SHA1 (xprobe2-0.2.tar.gz) = fc7231dbe1de518b49d15b8677a0b65661312cb4

For more information about Xprobe2 0.2 new features please see the  
presentation given at Blackhat Federal 2003:
http://www.sys-security.com/archive/blackhat/FEDERAL2003/ 
Ofir_Arkin_BH_FEDERAL.ppt [~600k]


Yours
Xprobe2 development team,

Ofir Arkin [ofir@...-security.com]
Founder
The Sys-Security Group
http://www.sys-security.com
PGP CC2C BE53 12C6 C9F2 87B1 B8C6 0DFA CF2D D360 43FA


Fyodor Yarochkin [fygrave@...erteam.net]


Meder Kydyraliev [Meder@...opag.net]



[1] http://www.sys-security.com/html/projects/X.html
[2] “xprobe2 - A 'Fuzzy' Approach to Remote Active Operating System  
Fingerprinting”, Ofir Arkin & Fyodor Yarochkin, August 2002,  
http://www.sys-security.com/archive/papers/Xprobe2.pdf
[3] “The Present and Future of Xprobe2 – The Next Generation of Active  
Operating System Fingerprinting”, Ofir Arkin, Fyodor Yarochkin, Meder  
Kydyraliev, July 2003,  
http://www.sys-security.com/archive/papers/Present_and_Future_Xprobe2- 
v1.0.pdf



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ