'\" t .\" Title: nping .\" Author: [see the "Authors" section] .\" Generator: DocBook XSL Stylesheets v1.79.1 .\" Date: 08/31/2022 .\" Manual: Nping Reference Guide .\" Source: Nping .\" Language: English .\" .TH "NPING" "1" "08/31/2022" "Nping" "Nping Reference Guide" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" ----------------------------------------------------------------- .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ .\" http://bugs.debian.org/507673 .\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ .ie \n(.g .ds Aq \(aq .el .ds Aq ' .\" ----------------------------------------------------------------- .\" * set default formatting .\" ----------------------------------------------------------------- .\" disable hyphenation .nh .\" disable justification (adjust text to left margin only) .ad l .\" ----------------------------------------------------------------- .\" * MAIN CONTENT STARTS HERE * .\" ----------------------------------------------------------------- .SH "NAME" nping \- Network packet generation tool / ping utility .SH "SYNOPSIS" .HP \w'\fBnping\fR\ 'u \fBnping\fR [\fIOptions\fR] {\fItargets\fR} .SH "DESCRIPTION" .PP Nping is an open\-source tool for network packet generation, response analysis and response time measurement\&. Nping allows users to generate network packets of a wide range of protocols, letting them tune virtually any field of the protocol headers\&. While Nping can be used as a simple ping utility to detect active hosts, it can also be used as a raw packet generator for network stack stress tests, ARP poisoning, Denial of Service attacks, route tracing, and other purposes\&. .PP Additionally, Nping offers a special mode of operation called the "Echo Mode", that lets users see how the generated probes change in transit, revealing the differences between the transmitted packets and the packets received at the other end\&. See section "Echo Mode" for details\&. .PP The output from Nping is a list of the packets that are being sent and received\&. The level of detail depends on the options used\&. .PP A typical Nping execution is shown in Example\ \&1\&. The only Nping arguments used in this example are \fB\-c\fR, to specify the number of times to target each host, \fB\-\-tcp\fR to specify TCP Probe Mode, \fB\-p 80,433\fR to specify the target ports; and then the two target hostnames\&. .PP \fBExample\ \&1.\ \&A representative Nping execution\fR .sp .if n \{\ .RS 4 .\} .nf # \fBnping \-c 1 \-\-tcp \-p 80,433 scanme\&.nmap\&.org google\&.com\fR Starting Nping ( https://nmap\&.org/nping ) SENT (0\&.0120s) TCP 96\&.16\&.226\&.135:50091 > 64\&.13\&.134\&.52:80 S ttl=64 id=52072 iplen=40 seq=1077657388 win=1480 RCVD (0\&.1810s) TCP 64\&.13\&.134\&.52:80 > 96\&.16\&.226\&.135:50091 SA ttl=53 id=0 iplen=44 seq=4158134847 win=5840 SENT (1\&.0140s) TCP 96\&.16\&.226\&.135:50091 > 74\&.125\&.45\&.100:80 S ttl=64 id=13932 iplen=40 seq=1077657388 win=1480 RCVD (1\&.1370s) TCP 74\&.125\&.45\&.100:80 > 96\&.16\&.226\&.135:50091 SA ttl=52 id=52913 iplen=44 seq=2650443864 win=5720 SENT (2\&.0140s) TCP 96\&.16\&.226\&.135:50091 > 64\&.13\&.134\&.52:433 S ttl=64 id=8373 iplen=40 seq=1077657388 win=1480 SENT (3\&.0140s) TCP 96\&.16\&.226\&.135:50091 > 74\&.125\&.45\&.100:433 S ttl=64 id=23624 iplen=40 seq=1077657388 win=1480 Statistics for host scanme\&.nmap\&.org (64\&.13\&.134\&.52): | Probes Sent: 2 | Rcvd: 1 | Lost: 1 (50\&.00%) |_ Max rtt: 169\&.720ms | Min rtt: 169\&.720ms | Avg rtt: 169\&.720ms Statistics for host google\&.com (74\&.125\&.45\&.100): | Probes Sent: 2 | Rcvd: 1 | Lost: 1 (50\&.00%) |_ Max rtt: 122\&.686ms | Min rtt: 122\&.686ms | Avg rtt: 122\&.686ms Raw packets sent: 4 (160B) | Rcvd: 2 (92B) | Lost: 2 (50\&.00%) Tx time: 3\&.00296s | Tx bytes/s: 53\&.28 | Tx pkts/s: 1\&.33 Rx time: 3\&.00296s | Rx bytes/s: 30\&.64 | Rx pkts/s: 0\&.67 Nping done: 2 IP addresses pinged in 4\&.01 seconds .fi .if n \{\ .RE .\} .PP The newest version of Nping can be obtained with Nmap at \m[blue]\fB\%https://nmap.org\fR\m[]\&. The newest version of this man page is available at \m[blue]\fB\%https://nmap.org/book/nping-man.html\fR\m[]\&. \-\-> .SH "OPTIONS SUMMARY" .PP This options summary is printed when Nping is run with no arguments\&. It helps people remember the most common options, but is no substitute for the in\-depth documentation in the rest of this manual\&. Some obscure options aren\*(Aqt even included here\&. .sp .if n \{\ .RS 4 .\} .nf Nping 0\&.7\&.92SVN ( https://nmap\&.org/nping ) Usage: nping [Probe mode] [Options] {target specification} TARGET SPECIFICATION: Targets may be specified as hostnames, IP addresses, networks, etc\&. Ex: scanme\&.nmap\&.org, microsoft\&.com/24, 192\&.168\&.0\&.1; 10\&.0\&.*\&.1\-24 PROBE MODES: \-\-tcp\-connect : Unprivileged TCP connect probe mode\&. \-\-tcp : TCP probe mode\&. \-\-udp : UDP probe mode\&. \-\-icmp : ICMP probe mode\&. \-\-arp : ARP/RARP probe mode\&. \-\-tr, \-\-traceroute : Traceroute mode (can only be used with TCP/UDP/ICMP modes)\&. TCP CONNECT MODE: \-p, \-\-dest\-port : Set destination port(s)\&. \-g, \-\-source\-port : Try to use a custom source port\&. TCP PROBE MODE: \-g, \-\-source\-port : Set source port\&. \-p, \-\-dest\-port : Set destination port(s)\&. \-\-seq : Set sequence number\&. \-\-flags : Set TCP flags (ACK,PSH,RST,SYN,FIN\&.\&.\&.) \-\-ack : Set ACK number\&. \-\-win : Set window size\&. \-\-badsum : Use a random invalid checksum\&. UDP PROBE MODE: \-g, \-\-source\-port : Set source port\&. \-p, \-\-dest\-port : Set destination port(s)\&. \-\-badsum : Use a random invalid checksum\&. ICMP PROBE MODE: \-\-icmp\-type : ICMP type\&. \-\-icmp\-code : ICMP code\&. \-\-icmp\-id : Set identifier\&. \-\-icmp\-seq : Set sequence number\&. \-\-icmp\-redirect\-addr : Set redirect address\&. \-\-icmp\-param\-pointer : Set parameter problem pointer\&. \-\-icmp\-advert\-lifetime