Announcement

Collapse
No announcement yet.

Tool - Ping

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Tool - Ping

    Tool: ping
    Use: Reconnaissane & Footprinting
    Version: iputils-s20161105 (From Kali)
    OS: Windows, Linux, MacOSX & others.
    Vendor/Author: YOSHIFUJI Hideaki
    URL: http://www.skbuff.net/iputils/
    Status: Unknown/Active
    Description: Send ICMP ECHO_REQUEST to network hosts.

    From the MAN page:
    Ping uses the ICMP protocol's mandatory ECHO_REQUEST datagram to elicit an ICMP ECHO_RESPONSE from a host or gateway. ECHO_REQUEST data‚Äźgrams (``pings'') have an IP and ICMP header, followed by a struct timeval and then an arbitrary number of ``pad'' bytes used to fill out the packet.

    Ping works with both IPv4 and IPv6. Using only one of them explicitly can be enforced by specifying -4 or -6.

    Ping can also send IPv6 Node Information Queries (RFC4620). Intermediate hops may not be allowed, because IPv6 source routing was deprecated (RFC5095).
    Ping is a tool in place for network administrators to verify if a given target host is running. This functions and capabilities of this tool was originally intended as at tool for testing only. Today a hacker may use it to discover which IP address could be a potential target. Some defenders may disable ICMP entirely to at least make it a bit harder for the attacker to discover which IP addresses are actually assigned to running computers.

    Note that even though the ping command exists on almost any operating system capable of attaching to a network, it is not the same program and variations or differences exists. The tool mentioned here is the Linux version and is part of the iputils suite.
    Certified Security Geek
Working...
X