hping3
hping3 is a network tool for sending custom ICMP/UDP/TCP packets and displaying target replies like ping. It supports testing firewall rules, port scanning, network performance testing, and more.
Description
hping3 is an active network smashing tool capable of sending custom ICMP/UDP/TCP packets and displaying target replies similar to ping with ICMP replies. It handles fragmentation, arbitrary packet body and size, and can transfer files under supported protocols. The tool is scriptable using the Tcl language.
Using hping3, you can test firewall rules, perform spoofed port scanning, test network performance with different protocols, conduct path MTU discovery, execute traceroute-like actions under various protocols, fingerprint remote operating systems, and audit TCP/IP stacks.
It supports multiple modes including RAW IP, ICMP, UDP, SCAN, and listen modes, with options for spoofing, randomization, and packet manipulation.
How It Works
hping3 sends custom crafted TCP/IP packets including ICMP, UDP, and TCP with configurable headers, fragmentation, TTL, IDs, and payloads. It displays replies from targets, supports spoofed source addresses, random destinations/sources, and protocol-specific options like ICMP types/codes or TCP ports/sequence numbers. Traceroute mode uses incremental TTL starting from 1 with binding implied.
Installation
sudo apt install hping3Flags
Examples
hping3 --traceroute -V -1 www.example.comhping3 -hhping3 --scan 1-30,70-90 -S www.target.hosthping3 --flood www.target.hosthping3 --fast www.target.hosthping3 --faster www.target.hosthping3 -1 www.target.hosthping3 -S www.target.host