Sends custom packets and displays target replies
'Hping' sends custom ICMP/UDP/TCP packets and displays target replies. It handles fragmentation and arbitrary packet body and size, and can be used to transfer files under supported protocols. With 'Hping', you can test firewall rules, perform [spoofed] port scanning, test net performance using different protocols, packet size, TOS (type of service), and fragmentation, do path MTU discovery, tranfer files (even between really Fascist firewall rules), perform traceroute-like actions under different protocols, fingerprint remote OSs, and audit a TCP/IP stack.
DocumentationUser manpage available in HTML format from http://www.hping.org/manpage.html
released on 22 June 2004
3 May 2004
Leaders and contributors
Resources and communication
This entry (in part or in whole) was last reviewed on 3 August 2018.
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.
The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.