Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
Ping is one of the oldest utilities in computing history. Nearly as old as the internet itself, the ability to send a data packet to a given server as part of a discovery, troubleshooting, or reconnaissance process is a fundamental aspect of security work. Now, Ping has gotten an upgrade. hping3 is a utility which allows you to perform the same basic functionality of ping, but across a plethora of protocols and methodologies. It's a fresh face on an old tactic, and one which will help propel you…
Teaching Assistant Vikramajeet Khatri
(Disclaimer: Breaking Stuff with Joe is a Cybrary series that will be running indefinitely. You will not earn CEU/CPE hours by watching any individual 'Breaking Stuff with Joe' episode. However, you can still earn a certificate of completion for each episode completed.)
Using the hping3 Tool
The hping3 tool is an upgrade of one of the oldest tools in the history of computing, ping. Ping has the capability to send a data packet to a server in order to discover, troubleshoot, or perform reconnaissance processes, which is a key component of information security work. hping3 is the upgraded tool that performs the same fundamental functionality of ping, but across a bunch of different protocols and methodologies. It’s a new and improved command line network tool version that helps information security professionals send custom TCP/IP packets. The hping3 tool supports UDP, TCP, ICMP, and Raw-IP protocols.
Why Use the hping3 Tool?
The hping3 tool has primarily been used as a security tool in the past. However, it’s now often used in many different ways, by professionals other than those in information security to test hosts and networks. It’s a versatile tool that offers the following capabilities:
- Firewall testing
- Remote OS fingerprinting
- Advanced port scanning
- Remote uptime guessing
- Network testing, using different protocols, TOS, fragmentation
- Advanced traceroute, under all the supported protocols
- Manual path MTU discovery
- TCP/IP stacks auditing
- TCP/UDP packet crafting
- Security penetration testing
- Spoofing users’ address and signatures
Because of its versatility, hping3 is frequently called a packet crafting tool. That means that it’s able to create nearly any type of packet imaginable. This is very effective when users are performing reconnaissance, as different packets will result in different responses from the operating system TCP/IP stack, providing clues to the primary ports, OS, and services. Hping3 is also very useful to anyone who is learning TCP/IP.
For more information about the hping3 tool, and to learn to use it, enroll in our How to Use hping3 tutorial. In the tutorial, you’ll learn the fundamentals of hping3 and how the tool can help you in your daily information security tasks. Enrolling in the tutorial is simple, just click on the Register button at the top right corner of this screen and you can get started with the course.