Hello, everyone. Welcome back to breaking stuff with Joe. I as always I'm your host, Joe Perry. And today we're gonna be talking about a tool called HP HP in three, as it is currently known with its version of age thing is a command line TCP over i p scanning tool that is very similar to the traditional paying utility,
but with a lot of additional functionality built on top of it,
it can construct packets and UDP TCP raw stock information. It can send these packets all sorts of different locations that are different channel styles and different communication methodologies. And it could be used even to enable denial of service attacks by sending sinful. It's against Your target is a very useful packet crafting tool for used across
Cyrus security spectrum.
So it's a really interesting tool. It's gonna be a fun video. We're going to see a couple of different ways you can craft packets with this thing and how we can use it to enable our cyber security scanning process. So stay tuned again. You're watching breaking stuff, Joe here on Cyberia, on demand.
All right, so here we are in our handy dandy Callie bm as usual, and the tool we're looking at here again is each ping or H Ping three, as it is currently known with its current version. And this tool, like I said, is a packet construction tool
that's built to be very similar to the ping utility. So if you're not already familiar with pain,
we can see here, Ping. If we paying, for example, Google,
this is what we get out of it. It's gonna give us our I. P M ICMP sequence is going to give us our times to let our time to live, and it's going to say where it's reaching. It's gonna give us the I P address of whatever. That final target is pretty straightforward, pretty simple. Now,
if we want to see a little bit more in depth information, let's say we want to do something a little bit more complex. That's when we're going to start using the HP.
So, for example, we might use H. Ping first. We'll use help
age being free.
We'll see the help, and we're going to see just the first thing we want to look at is the different modes that weaken send traffic in the different protocols we can use. You can see those air up here. So we've got bite default. We're going to be sending TCP traffic. We have the option to send raw I p traffic
ICMP traffic or you d be traffic. We can also perform scans in the same way they might use,
for example, an end map tool to scan a target domain.
And so to use those different modes, we just go ahead and give it the argument. Let's find our argument here.
So we've got just tack and then the number. And, of course, by default, Lady said. It's TCP,
so let's go ahead and run. H Ping three,
Tax zero Protect one for ICMP
and then we're going to go ahead and give it another useful piece of information, which is a trace route. So this argument basically just tells H paying three to behave like a tracer out tool. It's going to set
a time to live of zero, and it's going to increment that time to live as it tries to get access to the domain that it's targeting. So here will go ahead. We'll do www dot cyber very hot tea,
see what we can get out of it.
All right, so pretty quickly you can see that were built, were performing or tracer out process. We've got our initial gateway, and then we're kind of hopping through these different IP addresses until we find our target. It's taking a little bit longer with each one as packets getting dropped or it's losing traffic and is trying to replace its trying to rerun it. Make sure we get useful data
and it may have frozen on. It's actually let's see,
so we have 84% packet loss. That means that one of the hops on this process is not allowing us to connect all the way to Sigh Berry, which isn't entirely shocking. That's that's got more and more common that trace routes and pings are allowed from external networks.
There are a lot of reasons for that be. Some are good, some are bad.
But still, what's useful for us here is were quickly able to identify the first set, the first several hops in this series, and we're able to see OK, this is the path we're going to take, and then somewhere after this machine, the machine right after this one
is where we're getting dropped now weaken rerun H paying a few times. And because of dynamic routing and the way sort of the modern construction of the Internet,
it's very likely that we'll end up going through different gateway that might actually allow us to get access to. But we don't need to sit here and run this all day. We've got a good sense of how to use that command. So let's say we wanted to do something a little bit different. Let's say, for example, wanted to do H. Ping
and we want to descend an actual TCP connection, and we just want to type
google dot com.
So when we run this, you can see right away what's being set We have. The flag is set, as are a which is reset at, which is, ah,
not basically a flag that's going to get you any communication, any connection. Usually it's just gonna be dropped by your target, but you're able to see the I P address that you're getting responses from the time to live, values all the different values of this TCP packet, and so is performing utility very similar ping,
but using multiple different protocols. And as I said before, one of the great things about this tool
and it's something you should definitely explore is just how granular you're able to get with these packets you're constructing. You're able to communicate very, very specific information in a very tailored way by using this tool.
Now, as always, with breaking stuff with Joe, the goal here is to give you enough information to be dangerous and show you a tool that you can then spend a little bit more time on your own and some of our cyber ery labs playing around with. So it's gonna be all we do today. That's gonna be the end of this H Ping video, hopefully enjoy. Hopefully, you can find some really useful
utility for this particular tool
performing, you know, initial simple scans or even doing more robust packet construction.
It's a really cool tool. I'm always a fan of any, gives you that level of granular control and, of course, being a bolo. For example, perform trace route. Using TCP back it's instead of ICMP allows you to behave in ways that a lot of ideas is an I p s is probably wouldn't suspect or even detect. So that's all there is for today's video. Thank you so much for watching
this has been breaking stuff, Joe on Cyber eri on demand.
How to Use TOR (BSWJ)
In this course we review some of the most powerful cybersecurity tools available for use ...
Certificate of Completion Offered
How to Use tcpdump (BSWJ)
TCPDump is one of the best light-weight utilities for performing network traffic capture. It's extremely ...
Certificate of Completion Offered