Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u540484907/domains/icssindia.in/public_html/blogs/wp-includes/functions.php on line 6121

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the hueman domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u540484907/domains/icssindia.in/public_html/blogs/wp-includes/functions.php on line 6121
Hping – Top 10 Commands Used in Hping - ICSS BLOG

Hping – Top 10 Commands Used in Hping

Hping is a command-line based packet crafting tool. It can create packets using TCP, UDP, and ICMP. All of the header fields can be modified using the command line. A good understanding of ICMP, TCP, UDP and IP headers is required to use and understand this tool.

The following things can be done using hping:

  • Firewall testing
  • Network audits
  • Advanced Trace-route
  • Advanced port scanning and much more

 Usage:

  • List options for hping3

Syntax:

hping3 –help

  • List manual for hping3

Syntax:

man hping3

  • hping as a port scanner: By specifying the TCP flags and port numbers you can do port scanning using hping. An open port is defined by a packet returned with SA, whereas closed ports by an RA packet.

Syntax:

hping3 -S 192.168.1.10 -p 80

  • A nice feature is the “++”, which will increase the destination port in the packets by one. You can also press ‘ctrl+z’, instead of using ++, to increase the port number during the scan.

Syntax:

hping3 -S 192.168.1.10 -p ++79

  • A spoofed scan of the server by the attacker

Syntax:

hping3 -a 192.168.1.19 -S 192.168.1.10 -p ++20

  • SYN flood attack

Syntax:

hping3 -a 192.168.1.99 -S 192.168.1.10 -p 80 –flood

  • UDP flood attack

Syntax:

hping3 –udp -S 192.168.1.10 -p 80 –flood

  • ICMP flood attack

Syntax:

hping3 –icmp  -S 192.168.1.10 -p 80 –flood

  • Random Source Attack

Syntax:

hping3 –rand-source  -S 192.168.1.0

  • Change TTL of packet

Syntax:

  hping3 –ttl {value} -S {destination ip}

  • Limit Packet count

Syntax:

hping3 –count {no. of packet} -S {destination ip}

  • Scan Mode:

Syntax:

hping3 –scan 1-100 -S {target Ip}

  • Set Packet Flag

Syntax:

Set FIN flag

hping3 –fin -S {target ip}

Set SYN Flag

hping3 –syn -S {target ip}

Set RST flag

hping3 –rst -S {target ip}

Set PUSH flag

hping3 –push -S {target ip}

Set ACK flag

hping3 –ack -S {target ip}

Set URG flag

hping3 –urg -S {target ip}

  • Trace-route

Syntax:

hping3 –traceroute -S {target ip}

  • Verbose Mode:

Syntax:

hping3 -V -S {target ip}

 

For More CyberSecurity  Cool Stuff 

A BEGINNERS GUIDE TO CYBERSECURITY TRAINING, CERTIFICATION AND JOBS

cybersecurity for begginers

Cyber Security & Ethical Hacking Courses

ethical-hacking-course-in-delhi

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *