Hping Network Security – Kali Linux Tutorial

P { margin-bottom: 0.08in; }

There are mainly two factors are
involved in the success of penetration testing and ethical hacking,
one is the right methodology and second is the right tool. The
standard procedure of ethical hacking has already been discussed
which consist of information gathering and enumeration, these are
some really important steps which ultimately lead to the successful
hack. Nmap is for far the best utility to perform the network
information gathering and namp can also perform so many other tasks
including but not limited to: the port scanning, firewall and
operating system detection and even vulnerability analysis.

But, a smart hacker has a combination
of utilities and you should not stuck with some number of tools. You
should get command on different tools and techniques that might be
helpful in vulnerability assessment. You might have heard about hping
which is a command line tool and it is also called the TCP/IP
analyzer, it is available on the Kali Linux so if you are working on
Kali you need not to download it; users of other operating system
should get it from the official website.

Tests Hping can Perform

  • Firewall testing
  • Advanced port scanning
  • Network testing, using different
    protocols, TOS, fragmentation
  • Manual path MTU discovery
  • Advanced traceroute, under all the
    supported protocols
  • Remote OS fingerprinting
  • Remote uptime guessing
  • TCP/IP stacks auditing
  • hping can also be useful to students that are learning TCP/IP
Hping works on Linux, FreeBSD, NetBSD, OpenBSD, Solaris, MacOs X,
Goto ? Applications ?Kali Linux ? Information Gathering ?
Live Host Identification ? Hping3

Hping Tutorial

In this section I will discuss the commands to execute a
particular tasks, the theory and reason behind a tasks will not be
discussed. Some of reason like SYN packets are already discussed or
if you are using them it means you already understood what you are

To send SYN packets
hping3 -S target
hping3 -S ehacking.net
If you want to do inverse mapping then RST packets are
hping3 -R target
hping3 -R ehacking.net
DDOS attack using hping
sudo hping3 -i u1 -S -p <target port> <target ip>
Here -S indicates the SYN flag, -p means the desired port number,
-i u1 means the delay of 1 micro second between each packet,
–rand-source means to choose random source address. –rand-dest may
also be included.

Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

How to Exploit Heartbleed using Metasploit in Kali Linux

Heartbleed vulnerability (registered as CVE-2014-0160) is a security bug present in the older version of OpenSSL cryptographic library. OpenSSL is a cryptographic toolkit used...

How to Install Parrot Security OS on VirtualBox in 2020

Parrot Security OS is a free GNU/LINUX distribution, released on 10th April 2013. It is a mixture of Kali Linux and Frozenbox OS, aims to...

How to Install Kali Linux on VirtualBox [Windows Host] in 2020

Kali Linux is a Debian based Linux distribution, released on the 13th March 2013 as a complete rebuild of BackTrack Linux. It is one of...

Acunetix v13 Release Introduces Groundbreaking Innovations

The newest release of the Acunetix Web Vulnerability Scanner further improves performance and premieres best-of-breed technologies London, United Kingdom – February 5, 2019 – Acunetix,...