Using Backtrack: Network Mapping: Identify Live Hosts: hping

[Registered users of my site can access a whole series of articles and tutorials on security and networking tools, including BackTrack. Here’s a taste.
– Glenn]

hping, hping2 and hping3


The various versions of hping provide either a command-line or TCL interface. All of them are used to craft packets at the very lowest level: you can choose the network protocol and individual packet flags, spoof your addresses, flood a target, pop a shell and transfer files.


This is a phenomenally powerful tool, one that can do simple, stupid DOS attacks, or brilliant, subtle exploits; take your pick. There are a whole lot of good tutorials and how-tos on the Internet, so I’m linking you to some of these.


Information gathering

Home Page:



Read this one first at The Ethical Hacker Network:

Some good examples at

Very short examples:

One lengthy procedure:

A 5-part tutorial at