Friday, 15 June 2012

hping2 on backtrack 5r2


hping2

Introduction 
  • hping2 is a network tool able to send custom TCP/IP packets and to display target replies like ping program does with ICMP replies.
  • hping2 handle fragmentation, arbitrary packets body and size and can be used in order to transfer files encapsulated under supported protocols.
  • Using hping2 you are able to perform at least the following stuff :
  1. Test firewall rules .
  2. Advanced port scanning .
  3. Test net performance using different protocols, packet size, TOS (type of service) and fragmentation. -Path MTU discovery .
  4. Transferring files between even really fascist firewall rules. 
  5. Traceroute-like under different protocols.  
  6. Firewalk-like usage. 
  7. Remote OS fingerprinting. 
  8. TCP/IP stack auditing. 
  9. A lot of others.
  •  hping2 is developed and maintained by antirez@invece.org and is licensed under GPL version 2.
How To Open hping2
  • BackTrack > Information Gathering > Network Analysis > Identify Live Hosts > hping2 .
  • See the below image for more details - 


hping2 Usage : Basic Options
  • -h --help
    Show an help screen on standard output .
  • Command : hping2 -h 
  • See the image below for the result - 





Version command 


-v --version

Show version information and API used to access to data link layer, linux sock packet or libpcap

.See the below image for details - 







Count Command 
c --count count
  • Stop after sending (and receiving) count response packets. 
  • After last packet was send hping2 wait COUNTREACHED_TIMEOUT seconds target host replies.
  •  You are able to tune COUNTREACHED_TIMEOUT editing hping2.h
  • See the below image for more details - 


-i --interval
  • Wait the specified number of seconds or micro seconds between sending each packet. --interval X set wait to X seconds,
  • Interval uX set wait to X micro seconds. The default is to wait one second between each packet. 
  • Using hping2 to transfer files tune this option is really important in order to increase transfer rate.
  • See the below image for more details - 
  • Seconds Example - 

  • Micro- Seconds Example 
  • See the below image for Micro Second Example - 


--fast 
  • Alias for -i u10000. Hping will send 10 packets for second.
  • In this example , packets will send at the speed to 10000 micro seconds .
  • Fast way to send packets .
  • See the below image how to do that - 




--faster
Alias for -i u1. Faster then --fast ;) (but not as fast as your computer can send packets due to the signal-driven design).

See what happen if you send packets at the fastest speed - 




-n --numeric
  • Numeric output only, No attempt will be made to lookup symbolic names for host addresses.
  • See the below image for more details - 




-q --quiet
  • Quiet output. Nothing is displayed except the summary lines at startup time and when finished.
  • See the below image for more details -




-I --interface interface name
  • By default on linux and BSD systems hping2 uses default routing interface.
  •  In other systems or when there is no default route hping2 uses the first non-loopback interface. 
  • However you are able to force hping2 to use the interface you need using this option. 
  • Note: you don't need to specify the whole name, for example -I et will match eth0 ethernet0 myet1 et cetera. If no interfaces match hping2 will try to use lo.




-V --verbose
  • Enable verbose output. TCP replies will be shown as follows:
  • See the below example - 




-D --debug
  • Enable debug mode, it's useful when you experience some problem with hping2.
  •  When debug mode is enabled you will get more information about 
  1. interface detection,
  2. data link layer access,
  3. interface settings,
  4. options parsing, 
  5. fragmentation, 
  6. HCMP protocol and other stuff.

Protocol Selection

  • Default protocol is TCP, by default hping2 will send tcp headers to target host's port 0 with a winsize of 64 without any tcp flag on. 
  • Often this is the best way to do an 'hide ping', useful when target is behind a firewall that drop ICMP. Moreover a tcp null-flag to port 0 has a good probability of not being logged. 

-0 --rawip
  • RAW IP mode, in this mode hping2 will send IP header with data appended with --signature and/or --file.
  • See the below image for more details - 





-1 --icmp
  • ICMP mode, by default hping2 will send ICMP echo-request.
  • Set ICMP mode , see the below image for more details - 




-2 --udp

  • UDP mode, by default hping2 will send udp to target host's port 0.
  • See the below image for more details - 



--Scan Mode 
  • Scan the target with this command - 
  • See the below image for more details - 


THIS IS HOW WE CAN USE THIS TOOL , MORE EXAMPLES TO BE ADDED IN THIS TUTORIAL SO KEEP VISITING www.hackingdna.com .

VISIT www.hackingdna.com everday for great BackTrack 5 Tutorials . 

Any query you can post here , all suggesstions are warm welcome

Join Us 
On 
Facebook 

THIS ARTICLE IS JUST FOR EDUCATIONAL PURPOSE ONLY /- 

1 comments:

Anonymous said...

weqvfwe

Categories

Angry IPScanner On Backtrack 4 Arduino Arduino Opensource community attacks on router auditing tool Aurora Exploiting Through Kali Linux AUTOSCAN ON BACKTRACK 5 BackBox Linux On hackingDNA Backtrack 5 : Linux Commands Backtrack Bootable Pendrive Backtrack Tool : The Harvester Blender On Backtrack 5 Block Command Prompt Browser Autopwn On Backtrack 5 BUGTRAQ LOG REMOVER BLEACHBIT chkrootkit on Backtrack 5 chntpw on backtrack 5 cisco switches routing auditing tool. Client Side Attack On Backtrack 5 Command Shell Upgrade On Backtrack 5 Conky On Backtrack 5 convert guest account into admin using chntpw in backtrack 5 Convert Jpg Image into Ascii on Backtrack 5 countermeasures Cracking Unix Password On Backtrack 5 Cupp On Backtrack 5 Cutycapt On Kali Linux Detect Sniffer6 On Kali Linux dmitry on backtrack 5 Dnmap On Kali Linux dnsenum on backtrack 5 dnsrecon on backtrack 5 dnstracer on backtrack 5 dnswalk on backtrack 5 DOMAIN TOOL ON BUGTRAQ Dos attack driftnet on backtrack 5 dsniff on backtrack 5 enum4linux esp8266 EtherApe On BackTrack 5 ewizard on backtrack 5 ExifTool On BackTrack 5 Exploit Distccd On BackTrack 5 Exploit RDP Vulnerability On Kali Linux Exploit Samba Server On Backtrack 5 fatback on backtrack 5 FERN CRACKER ON BACKTRACK 5 Fierce in Backtrack 5 findmyhash : Crack the hash on Backtrack 5 Firewalk-Script On BackTrack 5 Firewall On Backtrack 5 Flash Player On Backtrack 5 Genlist On Backtrack 5 Gerix Cracker On Backtrack 5 Get Your Data Back Golismero On BackTrack 5 GOOFILE ON BUGTRAQ Google Kung-Fu goohost on backtrack 5 Grendel-Scan On Backtrack 5 gtk-recordmydesktop on backtrack 5 HACK BACKTRACK 5 via RAT Hack The Database with Backtrack 5 Hack the Facebook with Backtrack 5 Hack the windows in GNS3 Hack Windows XP using Backtrack 5 Hack Windows Xp using msfconsole hacking Hacking Lab 01 Hacking Windows 7 USING Backtrack 5 hackingdna hackingDNA choice :Best Antivirus Detection honeyd on backtrack 5 honeypot on backtrack 5 HOW TO INSTALL REDHAT ENTERPRISE LINUX 5 How to block ICMP request How To Install CAINE How to Install Chromium Browser on Backtrack 5 How to Install Windows 7 Ultimate How To Install Xampp On Kali Linux How to make new User in Backtrack 5 How to see files and directories on Linux how to use arduino in kali linux How to use Host Command on Backtrack 5 How to use Nano Editor on Backtrack 5 How to use Ping Command on Backtrack How to use whois tool on Backtrack 5 hping2 on backtrack 5r2 Httprint On BackTrack 5 icmpv6 flooding attack ifconfig command Installing And Accessing Backdoor On Backtrack 5 Installing software on Backtrack 5 using apt-get ipcalc on backtrack 5 Itrace On BackTrack 5 Jigsaw On Backtrack 5 Joomscan On Backtrack 5 KALI ARMITAGE ON KALI LINUX kali linux kali linux arduino Kali Linux Installation Kali Rolling Release 2016.2 keimpx on backtrack 5 Lanmap On Backtrack 4 Learn arping on Backtrack 5 Learn Basic of Internet with DAWN OF THE NET Learn Basics if Screen Utility Learn cmospwd on Backtrack 5 Learn dnsdict6 on backtrack 5 Learn fping on Backtrack 5 Learn Help Utilities Command On Backtrack 5 Learn hexedit on Backtrack 5 Learn how to hack root account on REDHAT5 Learn How to Install Backtrack 5 Learn how to make Bootable Pendrive Learn how to split Terminal into different regions Learn How To Split Terminal on backtrack 5 Learn how to use Armitage in Backtrack 5 Learn how to use chntpw on backtrack 5 LEARN HOW TO USE CISCO PACK ON BUGTRAQ - II Learn How to use ettercap on Backtrack 5 for hacking username and passwords Learn how to use Netstat Commands On Backtrack 5 Learn how to use nipper Learn How to work with Vim editor on Backtrack 5 Learn Linux Commands on Backtrack Environment Learn Netdiscover On Backtrack 5 Learn Pentbox On Backtrack 5 Learn Recoverjpeg on Backtrack 5 Learn samdump on backtrack 5 Learn TrueCrypt On Backtrack 5 LINUX NETWORKING COMMANDS ON BACKTRACK 5 linux OS LINUX PARTITION ON BACKTRACK 5 List-Urls On Backtrack 4 Load Balancing Detector On Backtrack 5 LOG REMOVER BLEACHBIT Lynis On Backtrack 5 Mac Tracker On Backtrack 5 macchanger on backtrack 5 Matriux Installation On hackingDNA Metaexploit Framework : Collecting Email Addresses Metasploit Framework With Basic Commands Meterpreter on Backtrack 5 mitre-cve on backtrack 5 MSF AUXILIARY SCANNING ON BACKTRACK 5 msf scanning on backtrack 5 nbtscan on backtrack 5 NESSUS ON BACKTRACK 5 Net Card Config Netcat : Learn how to create a instant chat session on Backtrack 5 netenum on backtrack 5 Netifera On Backtrack 5 NETMASK On Backtrack 5 NIKTO ON KALI LINUX Nmap Scanning On Backtrack 5 nmap smb script offensive security Oneko And Cowsay On BackTrack 5 OpenOffice On Backtrack 5 OpenVAS On Backtrack 5 Orion Browser History Dumper v1.0 Penetration Testing Pipal On Backtrack 5 PostgreSQL On Kali Linux Practice Session On Backtrack 5 PROTOS on backtrack 5 Reconnaissance Recover Kali Password Remote Desktop Connection Remote Desktop On Backtrack 5 Remote Desktop Sharing Removing Backdoor on Backtrack 5 Restrict Control Panel Restrict Registry Editor by Group Policies Rkhunter On Backtrack 5 router auditing tool Router Penetration Testing router security Safecopy On Backtrack 5 samba testing samrdump on backtrack 5 Scanning security auditing tool Shell Scripting On Kali Linux Shrink and Create Partition on Windows 7 Shutter On Backtrack 5 siege on backtrack 5 smb enumeration smb hacking Smbclient On Backtrack 5 Smtpscan On Backtrack 5 SMURF6 ON KALI LINUX Sniff Images on Backtrack 5 using Driftnet Snort On Backtrack 5 snurf6 Software Updates On Kali linux Spoof Your MAC Address on Backtrack 5 sql attack SSID ssldump on backtrack 5 sslstrip on backtrack 5 Start Backtrack 5 Without Startx Steam Locomotive On BackTrack5 Stop Bruteforce attack System Monitor On Backtrack 5 tcptraceroute on backtrack 5 Tctrace On Backtrack 5 TeamViewer On BackTrack 5 TELNET On Backtrack 5 Terminator On Backtrack 5 the Harvester On Backtrack 5 Things you should know about Backtrack Tweak Your System Settings On Backtrack 5 Tweak Your System Settings On Backtrack 5 Part 2 Unicornscan On BackTrack 5 Uniscan On Backtrack 5 urlcrazy on backtrack 5 urlsnarf on backtrack 5 WBOX on Backtrack 4 and 5 Weak points Web Httrack::Web Copier Websecurify On BackTrack5 Webshag On Backtrack 5 WEP CRACKING ON BACKTRACK 5 whatweb on backtrack 5 WHATWEB ON BUGTRAQ Wiffit (wafw00f): Firewall Detection Tool On Backtrack 5 wireshark Xpdf On Backtrack 5 xprobe2 on backtrack 5 Zenmap

Popular Posts