Users can also modify packet headers to try to elicit different responses from target devices. The default is TCP (Transmission Control Protocol). Hping differs from ping in that as well as sending ICMP packets, it can also send UDP (User Datagram Protocol) and IP (Internet Protocol) packets. In fact, a device does not even have to be fully booted before it will respond to ping. Ping tells you that the destination is reachable, but says nothing about what is going on at the other end. All that it does is send out ICMP requests (the ICMP ECHO_REQUEST) and then waits for a valid reply (an ICMP ECHO_RESPONSE). Ping uses the Internet Control Message Protocol (ICMP), one of the fundamental elements of TCP/IP. Another (and maybe more practical) way is to install hping.Īs the name suggests, hping is based on the ping utility, but the two applications are used in different ways.You will have used ping to see if a device is accessible via a network, and even looked at the route between your computer and another one (by using the -R option). One is to hire your own hacker and see if he can get in. You can test the security of your network in a number of ways.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |