SANS Institute - Nping: Difference between revisions
From GCA ACT
Jump to navigationJump to search
(Created via script) |
(Updated description via script) Tag: Reverted |
||
Line 1: | Line 1: | ||
=Description= | =Description=<br> | ||
<br> | Nmap is a free and open source tool for network exploration, management, and security auditing. It can be used to identify hosts and services on a network, as well as security issues. Nmap can be used to scan for vulnerable open ports on systems. Nping is a companion tool to Nmap which can be used for active probing of network hosts. Nping can be used to generate network traffic of different types, measure packet loss, and measure round trip time.=More Information= | ||
Nmap is a free and open source tool for network exploration, management, and security auditing. It can be used to identify hosts and services on a network, as well as security issues. Nmap can be used to scan for vulnerable open ports on systems. Nping is a companion tool to Nmap which can be used for active probing of network hosts. Nping can be used to generate network traffic of different types, measure packet loss, and measure round trip time. | |||
=More Information= | |||
<br> | <br> | ||
https://nmap.org/nping/ | https://nmap.org/nping/ | ||
[[Category:Incident Reporting & Recovery]] | [[Category:Incident Reporting & Recovery]] |
Revision as of 04:49, 23 April 2024
=Description=
Nmap is a free and open source tool for network exploration, management, and security auditing. It can be used to identify hosts and services on a network, as well as security issues. Nmap can be used to scan for vulnerable open ports on systems. Nping is a companion tool to Nmap which can be used for active probing of network hosts. Nping can be used to generate network traffic of different types, measure packet loss, and measure round trip time.=More Information=
https://nmap.org/nping/