The Hping tool can also be used for the performing of ping sweeps. Many security testers use this tool in order to bypass devices used for filtering. This the tool does with the help of injection of crafted IP packets of IP packets that have been modified in any other way. The Hping tool brings with it a plethora of features and functionalities, and it is wise for security testers to spend as much time as possible in learning how to use this advanced tool for port scanning. For a brief but helpful overview of the hping tool, the command –help}less command may be used. Browse through the parameters that are shown on the screen as a result of the command. A lot of parameters may be added to the Hping command, which allows the security tester to craft IP packets to suit their purposes.

 

The Hping help pages are very helpful to users, as they can use the info provided for all kinds of purposes. The information available on these pages covers things like commands for waiting, assigning aliases, getting numeric output, having quiet, putting on verbose mode, getting debugging info, blind, and unbinding. There is also info available regarding the Mode. The default mode is the TCP, with the others being the RAM IP, the ICMP. The UDP, and the SCAN modes. More information related to the different modes on the Hping pages includes info about the ICMP type, the ICMP code, sending ICMP types, Aliases, ICMP help, UDP/TCP base source port, UDP/TCP destination port, keeping UDP/TCP source port open, winsizing, TCP sequence number, badcksum, setting TCP sequence numbers, TCP ack, FIN flag, SYN flag, RST flag, PUSH flag, ACK flag, URG flag, X unused flag, Y unused flag, last TCP flag as exit codes, and enabling TCP H2/uptime timestamp.