Ping sweep

In computing, a ping sweep is a method that can establish a range of IP addresses which map to live hosts.

The classic tool used for ping sweeps is fping,[1][2][3] which traditionally was accompanied by gping to generate the list of hosts for large subnets,[4] although more recent versions of fping include that functionality.[1] Well-known tools with ping sweep capability include nmap for Unix and Windows systems, and the Pinger software from Rhino9 for Windows NT.[4][5] There are many other tools with this capability, including:[2][5] Hping, IEA's aping, Simple Nomad's ICMPEnum, SolarWind's Ping Sweep, and Foundstone's SuperScan. There is also a ping sweep tool for Windows, Mac, Linux, Android, and iOS called Fing made by Overlook Soft.

Pings can be detected by protocol loggers like ippl.[3]

References

  1. Mike Shema, Chris Davis, Anti-hacker tool kit, Edition 3, McGraw Hill Professional, 2006, ISBN 0-07-226287-7, pp. 403406
  2. Stuart McClure, Joel Scambray, George Kurtz, Hacking Exposed: Network Security Secrets & Solutions, Edition 6, McGraw Hill Professional, 2009, ISBN 0-07-161374-9, pp. 4451
  3. Teo, Lawrence (December, 2000). Network Probes Explained: Understanding Port Scans and Ping Sweeps, Linux Journal
  4. Stuart McClure and Joel Scambray, An arsenal of attack tools is an essential part of any strong security defense, InfoWorld, Jul 24, 2000, Vol. 22, No. 30, ISSN 0199-6649, p. 59
  5. Susan Elizabeth Young, Dave Aitel, The hacker's handbook: the strategy behind breaking into and defending Networks, CRC Press, 2004, ISBN 0-8493-0888-7, p. 75
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.