hping3网络工具
|
||
---|---|---|
.github/workflows | ||
debian | ||
docs | ||
utils | ||
antigetopt.c | ||
antigetopt.h | ||
apd.c | ||
ars.c | ||
ars.h | ||
arsglue.c | ||
AUTHORS | ||
binding.c | ||
BUGS | ||
byteorder | ||
byteorder.c | ||
byteorder.h | ||
bytesex.h | ||
CHANGES | ||
cksum.c | ||
configure | ||
COPYING | ||
datafiller.c | ||
datahandler.c | ||
display_ipopt.c | ||
gethostname.c | ||
getifname.c | ||
getlhs.c | ||
getusec.c | ||
globals.h | ||
hcmp.h | ||
hping2 | ||
hping2.h | ||
hping6 | ||
hstring.c | ||
hstring.h | ||
if_promisc.c | ||
in.h | ||
INSTALL | ||
ip_opt_build.c | ||
KNOWN-BUGS | ||
libars.a | ||
libpcap_stuff.c | ||
linux_sockpacket.c | ||
listen.c | ||
logicmp.c | ||
main.c | ||
Makefile | ||
Makefile.in | ||
memlock.c | ||
memlockall.c | ||
memstr.c | ||
memunlock.c | ||
memunlockall.c | ||
NEWS | ||
opensockraw.c | ||
parseoptions.c | ||
random6.c | ||
random.c | ||
README | ||
README.md | ||
release.h | ||
relid.c | ||
resolve.c | ||
rtt.c | ||
scan.c | ||
send.c | ||
sendhcmp.c | ||
sendicmp6.c | ||
sendicmp.c | ||
sendip6.c | ||
sendip_handler.c | ||
sendip.c | ||
sendrawip.c | ||
sendtcp.c | ||
sendudp.c | ||
signal.c | ||
sockopt.c | ||
split.c | ||
statistics.c | ||
strlcpy.c | ||
systype.h | ||
TODO | ||
usage.c | ||
version.c | ||
waitpacket.c |
This is regular hping2 with a few extra features:
-6
- required for ipv6 destinations--pps
--bps
- set outgoing pps/bps rates. Return packets are not processed in these modes.-flood
-send packets as soon as posible.- random source ip and dest ip support ipv6
Example:
root@koszik-vps:~# ./hping6 ns1.atw.hu -6 -2 -p 53 -k -s 1583 --traceroute
HPING ns1.atw.hu (eth0 2a01:270:0:2::11): udp mode set, 48 headers + 0 data bytes
hop=1 TTL 0 during transit from ip=2a00:1f40:2::1 name=2a00-1f40-2--1.pool6.giganet.hu hoprtt=0.9 ms
hop=2 TTL 0 during transit from ip=2a00:1f40:1:bb00::2:1 name=UNKNOWN hoprtt=1005.7 ms
hop=3 TTL 0 during transit from ip=2001:7f8:35::2:9278:2 name=UNKNOWN hoprtt=2011.2 ms
hop=4 TTL 0 during transit from ip=2a02:730:c:b01:b03:0:1:1 name=UNKNOWN hoprtt=3006.7 ms
hop=5 TTL 0 during transit from ip=2a01:270:c:c04:103::1 name=UNKNOWN hoprtt=4007.1 ms
hop=6 TTL 0 during transit from ip=2a01:270:c:c02:c04::1 name=UNKNOWN hoprtt=5007.7 ms
hop=7 TTL 0 during transit from ip=2a01:270:c:106::42 name=UNKNOWN hoprtt=6007.3 ms
^C
--- ns1.atw.hu hping statistic ---
12 packets transmitted, 7 packets received, 42% packet loss
round-trip min/avg/max = 0.9/3006.7/6007.3 ms
TCP flood attack with random source ip with ipv6:
root@testlab:~# ./hping6 2022:1:1:1::2 -6 --rand-source --flood
`2022:1:1:1::2` is the ipv6 address you want to attack