How to Use hping3 (BSWJ)


This tutorial covers Ping, one of the oldest utilities in computing history. Nearly as old as the internet itself, the ability to send a data packet to a given server as part of a discovery, troubleshooting, or reconnaissance process is a fundamental aspect of security work.

6 minutes
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *

Already have an account? Sign In »

This Course is part of a Career Path: Become a Penetration Tester
Course Content
Module 1: BSWJ: hping3


Follow A Path

Deciphering the essentials to enter a new career is hard, so we did it for you!

Focus on building your skills and take this course in a guided Career Path.

Course Description

Teaching Assistant Vikramajeet Khatri

(Disclaimer: Breaking Stuff with Joe is a Cybrary series that will be running indefinitely. You will not earn CEU/CPE hours by watching any individual 'Breaking Stuff with Joe' episode. However, you can still earn a certificate of completion for each episode completed.)

Using the hping3 Tool

The hping3 tool is an upgrade of one of the oldest tools in the history of computing, ping. Ping has the capability to send a data packet to a server in order to discover, troubleshoot, or perform reconnaissance processes, which is a key component of information security work. Now, Ping has gotten an upgrade. hping3 is a utility which allows you to perform the same basic functionality of ping, but across a plethora of protocols and methodologies. It's a fresh face on an old tactic, and one which will help propel you through your security work. It’s a new and improved command line network tool version that helps information security professionals send custom TCP/IP packets. The hping3 tool supports UDP, TCP, ICMP, and Raw-IP protocols.

Why Use the hping3 Tool?

The hping3 tool has primarily been used as a security tool in the past. However, it’s now often used in many different ways, by professionals other than those in information security to test hosts and networks. It’s a versatile tool that offers the following capabilities:

  • Firewall testing
  • Remote OS fingerprinting
  • Advanced port scanning
  • Remote uptime guessing
  • Network testing, using different protocols, TOS, fragmentation
  • Advanced traceroute, under all the supported protocols
  • Manual path MTU discovery
  • TCP/IP stacks auditing
  • TCP/UDP packet crafting
  • Security penetration testing
  • Spoofing users’ address and signatures

Because of its versatility, hping3 is frequently called a packet crafting tool. That means that it’s able to create nearly any type of packet imaginable. This is very effective when users are performing reconnaissance, as different packets will result in different responses from the operating system TCP/IP stack, providing clues to the primary ports, OS, and services. Hping3 is also very useful to anyone who is learning TCP/IP.

For more information about the hping3 tool, and to learn to use it, enroll in our How to Use hping3 tutorial. In the tutorial, you’ll learn the fundamentals of hping3 and how the tool can help you in your daily information security tasks. Enrolling in the tutorial is simple, just click on the Register button at the top right corner of this screen and you can get started with the course.

Instructed By
Joe Perry
Joe Perry
Senior Technical Instructor at FireEye, Inc
Certificate of Completion
Certificate Of Completion

Complete this entire course to earn a How to Use hping3 (BSWJ) Certificate of Completion

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.