Nmap Development mailing list archives
Call for testers: Nping 0.1BETA1 Released.
From: "Luis M." <luis.mgarc () gmail com>
Date: Thu, 06 Aug 2009 13:37:26 +0100
Hi! I am pleased to announce the first beta version of Nping, the new Nmap's packet generation utility. Nping, inspired by Antirez's hping application, lets you take your probing to a lower level. It allows to generate network packets of a wide range of protocols, letting users to tune virtually any field of the protocol headers. While Nping can be used as a simple ping utility to detect active hosts, it can also be used as a raw packet generator for network stack stress tests, ARP poisoning, Denial of Service attacks, route tracing, etc. This is a call for betatesters. Please, if you have the time, download Nping, play with it, and report any problems you find. Here are some simple instructions to get Nping working in 2 minutes: 1. GETTING THE SOURCE CODE You can download the latest version from the SVN repo running the following command: svn co --username guest --password "" svn://svn.insecure.org/nmap-exp/luis/nping 2. COMPILING AND INSTALLING 2.1 UNIX systems: The traditional "./configure && make && make install" should get Nping installed on your system. 2.2 Windows systems: 1. Open Visual Studio and the Nping solution file (nping/mswin32/nmap.sln). 2. Choose “Build Solution” from the “Build Menu”. Nping should begin compiling, and end with the line “-- Done --” saying that all projects built successfully and there were zero failures. 3. The executable file can be found in nping/mswin32/Debug/nping.exe. 4. Ensure that you have WinPcap installed. You can obtain it by installing our binary self-installer or executing winpcap-nmap-<version>.exe from our zip package. Alternatively, you can obtain the official installer at http://www.winpcap.org. 3. USING NPING A complete reference guide is available in the form of a man page. After installation, simply type "man nping" to access it. Also, an HTML version is available in nping/docs/nping_man.html. The man page is long so the attached file provides some examples that you can copy&paste into your terminal directly. Well, that's it. Thank you very much. Luis.
++++++++++++++++++++++++++ | NPING USAGE EXAMPLES | ++++++++++++++++++++++++++ # These can be run with no privileges ****************************************** /* Do simple TCP connect()s to one host */ nping --tcp-connect google.com /* Do simple TCP connect()s to multiple hosts */ nping --tcp-connect google.com ask.com yahoo.com bing.com /* Send an UDP packet with 100 bytes of random data */ nping --udp google.com -p 53 --data-length 100 /* Try to TCP connect() to a range of ports */ nping --tcp-connect google.com -p75-85 -c 1 # These require root access **************************************************** # Send TCP Syn with the ECN flag also set sudo nping --tcp google.com --flags syn,ecn -p80,443 # Send UDP packet with a bogus checksum from port 1337 sudo nping --udp --badsum --source-port 1337 -p 53 google.com -v6 # Send ARP requests to 192.168.1.1 sudo nping --arp 192.168.1.1 # Send ARP requests to all host in network 192.168.1.0 (inter-probe delay = 100ms) sudo nping --arp 192.168.1.0/24 --delay 100 # Send 300 TCP packets at a rate of 100pkts/sec sudo nping --tcp google.com --rate 100 -c 300 # Send ICMP echo request wit custom ID and Seq fields sudo nping google.com --icmp --icmp-type echo --icmp-id 31337 --icmp-seq 1 # Send ICMP echo reply sudo nping google.com --icmp --icmp-type echo-reply # Send ICMP Parameter problem with custom pointer sudo nping google.com --icmp --icmp-type parameter-problem --icmp-param-pointer 9 # Send ICMP Source Quench sudo nping google.com --icmp --icmp-type source-quench -v6 # Send ICMP Time Exceeded because time exceeded during reassembly sudo nping google.com --icmp --icmp-type te --icmp-code frag-exc -v5 # Send ICMP Router Advertising with 2 entries sudo nping google.com --icmp --icmp-type 9 --icmp-advert-entry 1.1.1.1,300 --icmp-advert-entry 33.33.33.33,12345 -v6
_______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://SecLists.Org
Current thread:
- Call for testers: Nping 0.1BETA1 Released. Luis M. (Aug 06)
- Re: Call for testers: Nping 0.1BETA1 Released. Ben Rosenberg (Aug 06)
- Re: Call for testers: Nping 0.1BETA1 Released. ithilgore (Aug 06)
- Re: Call for testers: Nping 0.1BETA1 Released. Luis M. (Aug 07)
- Re: Call for testers: Nping 0.1BETA1 Released. Luis M. (Aug 07)
- Re: Call for testers: Nping 0.1BETA1 Released. ithilgore (Aug 06)
- Re: Call for testers: Nping 0.1BETA1 Released. Toni Ruottu (Aug 06)
- Re: Call for testers: Nping 0.1BETA1 Released. Luis M. (Aug 07)
- Re: Call for testers: Nping 0.1BETA1 Released. David Fifield (Aug 07)
- Re: Call for testers: Nping 0.1BETA1 Released. Luis M. (Aug 08)
- Re: Call for testers: Nping 0.1BETA1 Released. Luis M. (Aug 07)
- Re: Call for testers: Nping 0.1BETA1 Released. Ben Rosenberg (Aug 06)
- Re: Call for testers: Nping 0.1BETA1 Released. DePriest, Jason R. (Aug 07)
- Re: Call for testers: Nping 0.1BETA1 Released. Luis M. (Aug 07)