SANS Institute - Hping3: Difference between revisions
From GCA ACT
Jump to navigationJump to search
(Updated description via script) Tag: Reverted |
(Updated via script) Tag: Manual revert |
||
Line 1: | Line 1: | ||
=Description=<br> | =Description= | ||
<br> | |||
Hping3 is a network tool that can be used for tasks such as network testing, scanning, and finding vulnerabilities. It can be run on Linux and Windows, and it supports both IPv4 and IPv6. | Hping3 is a network tool that can be used for tasks such as network testing, scanning, and finding vulnerabilities. It can be run on Linux and Windows, and it supports both IPv4 and IPv6. | ||
Hping3 can be used to test firewall rules, to find open ports, and to fingerprint operating systems. It can also be used to DoS a target by flooding it with packets.=More Information= | Hping3 can be used to test firewall rules, to find open ports, and to fingerprint operating systems. It can also be used to DoS a target by flooding it with packets. | ||
Hping3 is a versatile tool that can be used for a | |||
<br> | |||
=More Information= | |||
<br> | <br> | ||
http://www.hping.org/ | http://www.hping.org/ | ||
[[Category:Security Testing & Auditing]] | [[Category:Security Testing & Auditing]] | ||
[[Category:Attack & Penetration Testing]] | [[Category:Attack & Penetration Testing]] |
Revision as of 05:05, 23 April 2024
Description
Hping3 is a network tool that can be used for tasks such as network testing, scanning, and finding vulnerabilities. It can be run on Linux and Windows, and it supports both IPv4 and IPv6.
Hping3 can be used to test firewall rules, to find open ports, and to fingerprint operating systems. It can also be used to DoS a target by flooding it with packets.
Hping3 is a versatile tool that can be used for a