The Power of Hping3

December 18, 2016 | Views: 13596

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Hello, Cybrarians! What’s going on?

Sometimes you find that the ping command is not working. You get a message “Request timed out” or “Packet lost 100%”. There could be many reasons why these messages show up.

Ping uses ICMP packets to check whether the site is up or down. Ping is used for network analysis, firewall analysis specifically. Some websites block ICMP packet or drop these packets for reducing network traffic or DoS attack, but you can still access them. Web sites facing DoS problems can configure their firewalls to drop ICMP packets.

But you still want to ping those websites. In this case, use hping3.

It is already installed in Kali Linux, but it also supports Windows.

Hping3 is a command line network tool designed for sending custom TCP/IP packets. It supports TCP, UDP, ICMP and Raw-IP protocols. With hping3 you can do Firewall testing, Remote OS fingerprinting, advanced port scanning, TCP/UDP packet crafting, security penetration testing, spoofing your address and signatures, and much more.

You can search for a manual page in Kali Linux by just typing the command::

man hping3

And, all the commands used would be in front of you. Using hping3 you can launch untraceable DoS attacks.

If you enjoyed this, here is another one of my posts:


Stay tuned! Most interesting technologies are on the way. All the best.

Share with Friends
Use Cybytes and
Tip the Author!
Share with Friends
Ready to share your knowledge and expertise?
  1. Hey, Bachan.
    I’m new to kali (and the security world), but I’m quite interested to know what you mean by “untraceable DoS.” Why are Hping3 packets untraceable, other than that most servers won’t be configured to block them like they would ICMP packets? Wouldn’t they still be backtraceable?

    • I’m a graduate in IS security and may not know as much as the professionals but I think untraceable DoS means that unlike normal DoS attacks, it can be linked to the server from which the attack took place. Untraceable DoS like you mentioned is not back traceable. It’s a clean attack compared to the usual DoS attack. It leaves very little or no information about its origin

    • I think u need to see the the manual page of hping3. There is a option for choosing random address, by this u can launch untraceable DoS. The ans for second question is that when use hping3, u can customize ur packets, u can use more packets other than icmp, like syn packets which are not blocked.
      I think u got my point. So try to do something, u will get all the answers by trying. All the best.

  2. Few examples would have helped. Thanks!

  3. sir,can yo describe different uses of kali linux

Page 1 of 212»
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge



Is Linux Worth Learning in 2020?
Views: 568 / December 14, 2019
How do I Get MTA Certified?
Views: 1140 / December 12, 2019
How much does your PAM software really cost?
Views: 1584 / December 10, 2019
How Do I Get into Android Development?
Views: 1967 / December 8, 2019

We recommend always using caution when following any link

Are you sure you want to continue?