Ping sweep: Difference between revisions
Warrickcleet (talk | contribs) m Improved grammar Tags: Visual edit Mobile edit Mobile web edit |
Warrickcleet (talk | contribs) m Nmap is available for windows. Tags: Visual edit Mobile edit Mobile web edit |
||
Line 1: | Line 1: | ||
In [[computing]], a '''[[Ping (networking utility)|ping]] sweep''' is a method that can establish a range of [[IP addresses]] which map to live hosts. |
In [[computing]], a '''[[Ping (networking utility)|ping]] sweep''' is a method that can establish a range of [[IP addresses]] which map to live hosts. |
||
The classic tool used for ping sweeps is {{Not a typo|fping}},<ref name=ahtk/><ref name=he09>Stuart McClure, Joel Scambray, George Kurtz, ''Hacking Exposed: Network Security Secrets & Solutions'', Edition 6, McGraw Hill Professional, 2009, {{ISBN|0-07-161374-9}}, pp. 44–51</ref><ref name=lj00>Teo, Lawrence (December, 2000). ''[http://www.linuxjournal.com/article/4234 Network Probes Explained: Understanding Port Scans and Ping Sweeps]'', [[Linux Journal]]</ref> which traditionally was accompanied by {{Not a typo|gping}} to generate the list of hosts for large subnets,<ref name=iw00/> although more recent versions of {{Not a typo|fping}} include that functionality.<ref name=ahtk>Mike Shema, Chris Davis, ''Anti-hacker tool kit'', Edition 3, McGraw Hill Professional, 2006, {{ISBN|0-07-226287-7}}, pp. 403–406</ref> Well-known tools with ping sweep capability include [[nmap]] for [[Unix]] systems, and the Pinger software from Rhino9 for [[Windows NT]].<ref name=iw00>Stuart McClure and Joel Scambray, ''An arsenal of attack tools is an essential part of any strong security defense'', [[InfoWorld]], Jul 24, 2000, Vol. 22, No. 30, ISSN 0199-6649, p. 59</ref><ref name=hh04>Susan Elizabeth Young, Dave Aitel, ''The hacker's handbook: the strategy behind breaking into and defending Networks'', CRC Press, 2004, {{ISBN|0-8493-0888-7}}, p. 75</ref> There are many other tools with this capability, including:<ref name=he09/><ref name=hh04/> Hping, IEA's aping, Simple Nomad's ICMPEnum, SolarWind's Ping Sweep, and Foundstone's SuperScan. There is also a ping sweep tool for Windows, Mac, Linux, Android, and iOS called Fing made by Overlook Soft. |
The classic tool used for ping sweeps is {{Not a typo|fping}},<ref name=ahtk/><ref name=he09>Stuart McClure, Joel Scambray, George Kurtz, ''Hacking Exposed: Network Security Secrets & Solutions'', Edition 6, McGraw Hill Professional, 2009, {{ISBN|0-07-161374-9}}, pp. 44–51</ref><ref name=lj00>Teo, Lawrence (December, 2000). ''[http://www.linuxjournal.com/article/4234 Network Probes Explained: Understanding Port Scans and Ping Sweeps]'', [[Linux Journal]]</ref> which traditionally was accompanied by {{Not a typo|gping}} to generate the list of hosts for large subnets,<ref name=iw00/> although more recent versions of {{Not a typo|fping}} include that functionality.<ref name=ahtk>Mike Shema, Chris Davis, ''Anti-hacker tool kit'', Edition 3, McGraw Hill Professional, 2006, {{ISBN|0-07-226287-7}}, pp. 403–406</ref> Well-known tools with ping sweep capability include [[nmap]] for [[Unix]] and [[Microsoft Windows|Windows]] systems, and the Pinger software from Rhino9 for [[Windows NT]].<ref name=iw00>Stuart McClure and Joel Scambray, ''An arsenal of attack tools is an essential part of any strong security defense'', [[InfoWorld]], Jul 24, 2000, Vol. 22, No. 30, ISSN 0199-6649, p. 59</ref><ref name=hh04>Susan Elizabeth Young, Dave Aitel, ''The hacker's handbook: the strategy behind breaking into and defending Networks'', CRC Press, 2004, {{ISBN|0-8493-0888-7}}, p. 75</ref> There are many other tools with this capability, including:<ref name=he09/><ref name=hh04/> Hping, IEA's aping, Simple Nomad's ICMPEnum, SolarWind's Ping Sweep, and Foundstone's SuperScan. There is also a ping sweep tool for Windows, Mac, Linux, Android, and iOS called Fing made by Overlook Soft. |
||
Pings can be detected by protocol loggers like {{Not a typo|ippl}}.<ref name=lj00/> |
Pings can be detected by protocol loggers like {{Not a typo|ippl}}.<ref name=lj00/> |
Latest revision as of 08:31, 9 February 2023
In computing, a ping sweep is a method that can establish a range of IP addresses which map to live hosts.
The classic tool used for ping sweeps is fping,[1][2][3] which traditionally was accompanied by gping to generate the list of hosts for large subnets,[4] although more recent versions of fping include that functionality.[1] Well-known tools with ping sweep capability include nmap for Unix and Windows systems, and the Pinger software from Rhino9 for Windows NT.[4][5] There are many other tools with this capability, including:[2][5] Hping, IEA's aping, Simple Nomad's ICMPEnum, SolarWind's Ping Sweep, and Foundstone's SuperScan. There is also a ping sweep tool for Windows, Mac, Linux, Android, and iOS called Fing made by Overlook Soft.
Pings can be detected by protocol loggers like ippl.[3]
References
[edit]- ^ a b Mike Shema, Chris Davis, Anti-hacker tool kit, Edition 3, McGraw Hill Professional, 2006, ISBN 0-07-226287-7, pp. 403–406
- ^ a b Stuart McClure, Joel Scambray, George Kurtz, Hacking Exposed: Network Security Secrets & Solutions, Edition 6, McGraw Hill Professional, 2009, ISBN 0-07-161374-9, pp. 44–51
- ^ a b Teo, Lawrence (December, 2000). Network Probes Explained: Understanding Port Scans and Ping Sweeps, Linux Journal
- ^ a b Stuart McClure and Joel Scambray, An arsenal of attack tools is an essential part of any strong security defense, InfoWorld, Jul 24, 2000, Vol. 22, No. 30, ISSN 0199-6649, p. 59
- ^ a b Susan Elizabeth Young, Dave Aitel, The hacker's handbook: the strategy behind breaking into and defending Networks, CRC Press, 2004, ISBN 0-8493-0888-7, p. 75