OWASP NINJA PingU - Not Just A Ping Utility
NINJA-PingU Is Not Just a Ping Utility is a free open-source high performance network scanner tool for large scale analysis. It has been designed with performance as its primary goal and developed as a framework to allow easy plugin creation. It comes out of the box with a set of plugins for services analysis embedded devices identification and to spot backdoors.

How NINJA PingU Works?

NINJA PingU takes advantage of raw sockets to reduce the three-way TCP handshake latency and it's state. Directly sending IP packets also avoids the TCP stack overhead.

It also implements non-blocking networking I/O in the plugin's interface by means of epoll. Each component is multithreaded and they have built-in caches to minimize synchronization points. In addition, the results persistment operations are buffered to reduce disk writes.

Why NINJA PingU?

It has been developed to easily allow developers build their custom plugins. Samples of those can be found in its codebase. NINJA PingU also integrates gnuplot to automatically plot the analysis results. In addition, a custom terminator has been embedded for enhanced data visualization.

NINJA PingU V1.0 is available here.  


NINJA PingU comes with all the necessesary dependencies out of the box. The following platform is requiered, though.
- gcc
- Linux box. Will not work neither on *BSD or Windows OS.
- Root Privileges

note: root is required to create raw socket descriptors.

Getting Started

NINJA-PingU currently, only works under Linux and the gcc compiler is required. To get pingu, you can run:
$ cd /tmp; wget; tar -xvf v1.0.1.tar.gz; cd NINJA-PingU-1.0.1/; ./

The Makefile will build the binary bin/npingu and the ninja-pingu plugins located at src/plugin. On the other hand, you can run the script, which automatically compiles NINJA PingU, tunes the operating system for enhanced network performance, and launches a custom terminator terminal for improved user experience.
$ ./

Basic Usage

The following is the NINJA PingU basic usage.
# sudo ./bin/npingu [OPTIONS] targets
  -t Number of sender threads.
  -p Port scan range. For instance, 80 or 20-80.
  -d Delay between packages sent (in usecs).
  -s No service discoverage (less bandwith load, more hosts/time).
  -m Module to run. For instance, Service.
  [targets] Can be a single ip or a range (i.e.
  -h Show this help.

Below it is shown some examples.
# ./bin/npingu -t 3 -p 20-80 -d 10 -m Service
  -Targeted Hosts []
  -Targeted Port Range [20-80]
  -Threads [3]
  -Delay 10 usec
  -Use the [Service] discoverage Plugin

# ./bin/npingu -t 5 -p 80 -s #scan google
  -Targeted Hosts []
  -Targeted Port [80]
  -Threads [5]
  -synOnly scan (without plugins)

You can run ninja pingu with the -h flag to get the help.

OWASP NINJA PingU - Not Just A Ping Utility Reviewed by Ethical Hacking on 1:31 PM Rating: 5

No comments:

Feel free to ask questions, we love to respond.

All Rights Reserved by The World of IT & Cyber Security: © 2014 - 2015
Powered By Blogger, Designed by Sweetheme

Contact Form


Email *

Message *

Powered by Blogger.