Nmap Development mailing list archives

Re: Call for testers: Nping 0.1BETA1 Released.


From: "Luis A. Bastiao Silva" <luis.kop () gmail com>
Date: Sat, 8 Aug 2009 13:34:57 +0100

Hi Luis,

You guys made a great job with Nping. Congrats.

I'm testing it on Mac OS X 10.5.8.
sudo   nping --tcp -p 80 --flags rst --ttl 2 192.168.1.1
(...)
sendto in send_ip_packet: sendto(3, packet, 40, 0, 192.168.1.1, 16) =>
Invalid argument
Offending packet: TCP 192.168.1.4:31426 > 192.168.1.1:80 R ttl=2 id=56905
iplen=40  seq=3167946379 win=1480
SENT (1.0000s) TCP 192.168.1.4:31426 > 192.168.1.1:80 R ttl=2 id=56905
iplen=40  seq=3167946379 win=1480

I checked with a sniffer and no packets are out of my interface.

I think it is a problem. Is it?

On Thu, Aug 6, 2009 at 1:37 PM, Luis M. <luis.mgarc () gmail com> wrote:

Hi!

I am pleased to announce the first beta version of Nping, the new Nmap's
packet generation utility.

Nping, inspired by Antirez's hping application, lets you take your probing
to a lower level. It allows to generate network packets of a wide range of
protocols, letting users to tune virtually any field of the protocol
headers. While Nping can be used as a simple ping utility to detect active
hosts, it can also be used as a raw packet generator for network stack
stress tests, ARP poisoning, Denial of Service attacks, route tracing, etc.


This is a call for betatesters. Please, if you have the time, download
Nping, play with it, and report any problems you find. Here are some simple
instructions to get Nping working in 2 minutes:


1. GETTING THE SOURCE CODE

You can download the latest version from the SVN repo running the following
command:

svn co --username guest --password "" svn://
svn.insecure.org/nmap-exp/luis/nping

2. COMPILING AND INSTALLING

2.1 UNIX systems:

The traditional "./configure && make && make install" should get Nping
installed on your system.

2.2 Windows systems:

1. Open Visual Studio and the Nping solution file (nping/mswin32/nmap.sln).
2. Choose “Build Solution” from the “Build Menu”. Nping should begin
compiling, and end with the line “-- Done --” saying that all projects built
successfully and there were zero failures.
3. The executable file can be found in nping/mswin32/Debug/nping.exe.
4. Ensure that you have WinPcap installed. You can obtain it by installing
our binary self-installer or executing winpcap-nmap-<version>.exe from our
zip package. Alternatively, you can obtain the official installer at
http://www.winpcap.org.


3. USING NPING

A complete reference guide is available in the form of a man page. After
installation, simply type "man nping" to access it. Also, an HTML version is
available in nping/docs/nping_man.html. The man page is long so the attached
file provides some examples that you can copy&paste into your terminal
directly.


Well, that's it. Thank you very much.


Luis.









++++++++++++++++++++++++++
|  NPING USAGE EXAMPLES  |
++++++++++++++++++++++++++


# These can be run with no privileges
******************************************

/* Do simple TCP connect()s to one host */
nping --tcp-connect google.com

/* Do simple TCP connect()s to multiple hosts */
nping --tcp-connect google.com ask.com yahoo.com bing.com

/* Send an UDP packet with 100 bytes of random data */
nping --udp google.com -p 53 --data-length 100

/* Try to TCP connect() to a range of ports */
nping --tcp-connect google.com -p75-85 -c 1

# These require root access
****************************************************

# Send TCP Syn with the ECN flag also set
sudo nping --tcp google.com --flags syn,ecn -p80,443

# Send UDP packet with a bogus checksum from port 1337
sudo nping --udp --badsum --source-port 1337 -p 53 google.com -v6

# Send ARP requests to 192.168.1.1
sudo nping --arp 192.168.1.1

# Send ARP requests to all host in network 192.168.1.0 (inter-probe delay =
100ms)
sudo nping --arp 192.168.1.0/24 --delay 100

# Send 300 TCP packets at a rate of 100pkts/sec
sudo nping --tcp google.com --rate 100 -c 300

# Send ICMP echo request wit custom ID and Seq fields
sudo nping google.com --icmp --icmp-type echo --icmp-id 31337 --icmp-seq 1

# Send ICMP echo reply
sudo nping google.com --icmp --icmp-type echo-reply

# Send ICMP Parameter problem with custom pointer
sudo nping google.com --icmp --icmp-type parameter-problem
--icmp-param-pointer 9

# Send ICMP Source Quench
sudo nping google.com --icmp --icmp-type source-quench -v6

# Send ICMP Time Exceeded because time exceeded during reassembly
sudo nping google.com --icmp --icmp-type te --icmp-code frag-exc -v5

# Send ICMP Router Advertising with 2 entries
sudo nping google.com --icmp --icmp-type 9 --icmp-advert-entry 1.1.1.1,300
--icmp-advert-entry 33.33.33.33,12345 -v6


_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org



Best Regards,
-- 
Luís A. Bastião Silva

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: