Package: xprobe / 0.3-4

fix-man-page.patch Patch series | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
Description: Update the manpage
 Fix the title to have the correct section
 Drop the reference to undefined macro Sp
 Change homepage URL
Author: Sophie Brun <sophie@freexian.com>
Last-Update: 2016-03-15
---
This patch header follows DEP-3: http://dep.debian.net/deps/dep3/
--- a/docs/xprobe2.1
+++ b/docs/xprobe2.1
@@ -21,7 +21,7 @@
 
 .\" Generate man page: groff -man -Tascii xprobe.1 
 
-.TH XPROBE2  "$Id: xprobe2.1,v 1.18 2005/07/26 12:48:59 mederchik Exp $"
+.TH XPROBE2 1
 .SH NAME
 xprobe2 \- A Remote active operating system fingerprinting tool.
 .SH SYNOPSIS
@@ -124,7 +124,7 @@ causes \fIxprobe2\fP to be a bit more no
 enable built-in portscanning module, which will attempt to scan TCP and/or UDP ports respectively, which were specified in \fIport spec\fP
 .TP
 .B -A
-enable experimental support for detection of transparent proxies and firewalls/NIDSs spoofing RST packets in portscanning module. Option should be used in conjunction with -T. All responses from target gathered during portscanning process are divided in two classes (SYN|ACK and RST) and saved for analysis. During analysis module will search for different packets, based on some of the fields of TCP and IP headers, withing the same class and if such packets are found, message will be displayed showing different packets withing the same class.
+enable experimental support for detection of transparent proxies and firewalls/NIDSs spoofing RST packets in portscanning module. Option should be used in conjunction with -T. All responses from target gathered during portscanning process are divided in two classes (SYN|ACK and RST) and saved for analysis. During analysis module will search for different packets, based on some of the fields of TCP and IP headers, within the same class and if such packets are found, message will be displayed showing different packets within the same class.
 .SH EXAMPLES
 .LP
 .RS
@@ -132,7 +132,6 @@ enable experimental support for detectio
 \fBxprobe2 -v -D 1 -D 2 192.168.1.10\fP
 .fi
 
-.Sp
 Will launch an OS fingerprinting attempt targeting 192.168.1.10. Modules 1 and 2, which are reachability tests, will be disabled, so probes will be sent even if target is down. Output will be verbose.
 
 .RE
@@ -141,7 +140,6 @@ Will launch an OS fingerprinting attempt
 \fBxprobe2 -v -p udp:53:closed 192.168.1.20\fP
 .fi
 
-.Sp
 Will launch an OS fingerprint attempt targeting 192.168.1.20. The UDP destination port is set to 53, and the output will be verbose.
 
 .RE
@@ -150,8 +148,7 @@ Will launch an OS fingerprint attempt ta
 \fBxprobe2 -M 11 -p tcp:80:open 192.168.1.1\fP
 .fi
 
-.Sp
-Will only enable TCP handshake module (number 11) to probe the target, very usefull when all ICMP traffic is filtered.
+Will only enable TCP handshake module (number 11) to probe the target, very useful when all ICMP traffic is filtered.
 .RE
 .RS
 
@@ -159,7 +156,6 @@ Will only enable TCP handshake module (n
 \fBxprobe2 -B 192.168.1.1\fP
 .fi
 
-.Sp
 Will cause TCP handshake module to try blindly guess open port on the target by sequentially sending TCP packets to the most likely open ports (80, 443, 23, 21, 25, 22, 139, 445 and 6000).
 .RE
 
@@ -168,7 +164,6 @@ Will cause TCP handshake module to try b
 \fBxprobe2 -T 1-1024 127.0.0.1\fP
 .fi
 
-.Sp
 Will enable portscanning module, which will scan TCP ports starting from 1 to 1024 on 127.0.0.1
 .RE
 
@@ -177,7 +172,6 @@ Will enable portscanning module, which w
 \fBxprobe2 -p tcp:139:open 192.168.1.2\fP
 .fi
 
-.Sp
 If remote target has TCP port 139 open, the command line above will enable application level SMB module (if remote target has TCP port 445 open, substitue 139 in the command line with 445).
 .RE
 
@@ -186,7 +180,6 @@ If remote target has TCP port 139 open,
 \fBxprobe2 -p udp:161:open 192.168.1.10\fP
 .fi
 
-.Sp
 Will enable SNMPv2c application level module, which will try to retrieve sysDescr.0 OID using community strings taken from xprobe2.conf file.
 .RE
 
@@ -206,13 +199,9 @@ Fyodor Yarochkin <fyodor@o0o.nu>, Ofir A
 .PP
 (see also CREDITS in distro tarball).
 .SH AVAILABILITY
-The current version and relevant documentation is available from following urls:
+The current version and relevant documentation is available from following url:
 .br
-.I http://www.sys-security.com/html/projects/X.html
-.br
-.I http://xprobe.sourceforge.net
-.br
-.I http://www.notlsd.net/xprobe/
+.I https://sourceforge.net/projects/xprobe/
 .SH BUGS
 None known (please report).