Annotation of embedaddon/hping2/NEWS, revision 1.1.1.1
1.1 misho 1: This short document is for users of hping-beta54 or prior versions
2: and helps to exploit all the new features of this hping2 release in a
3: short time. You may want to read the new man page anyway but the
4: following will help for sure:
5:
6: === release candidate 3 news
7:
8: In this release a nasty bug with the checksum code was fixed.
9: If you experimented strange problems like some kind of packet
10: generated with a wrong checksum try this version.
11:
12: Try the --scan option in the command line to see the port-scanner features.
13:
14: Example of the --scan option usage:
15:
16: # hping3 --scan known 1.2.3.4
17:
18: Scanning 1.2.3.4 (1.2.3.4), port known
19: 245 ports to scan, use -V to see all the replies
20: +----+-----------+---------+---+-----+-----+-----+
21: |port| serv name | flags |ttl| id | win | len |
22: +----+-----------+---------+---+-----+-----+-----+
23: 9 discard : .S..A... 64 0 32767 44
24: 13 daytime : .S..A... 64 0 32767 44
25: 21 ftp : .S..A... 64 0 32767 44
26: 22 ssh : .S..A... 64 0 32767 44
27: 25 smtp : .S..A... 64 0 32767 44
28: 37 time : .S..A... 64 0 32767 44
29: 80 www : .S..A... 64 0 32767 44
30: 111 sunrpc : .S..A... 64 0 32767 44
31: 113 auth : .S..A... 64 0 32767 44
32: 631 ipp : .S..A... 64 0 32767 44
33: 3306 mysql : .S..A... 64 0 32767 44
34: 6000 x11 : .S..A... 64 0 32767 44
35: 6667 ircd : .S..A... 64 0 3072 44
36: All replies received. Done.
37: Not responding ports:
38:
39: Check the man page for more information on the scan mode.
40:
41: === release candidate 2 news
42:
43: . Now hping is able to send/parse source routed IP headers.
44: See the manpage for more info.
45:
46: . Hping was almost rewrote, at least all the most important parts.
47: You should experiment a more readable, compact, fast to compile
48: code.
49:
50: . The new option parsing code allows you to specify abbreviated
51: options. you can now use for example --tcp-ti instead of --tcp-timestamp
52: and so on.
53:
54: . The new feature rand-dest allows to send the packet to random
55: IP addresses. This is very useful to do some Internet survey
56: or large subnet random scanning.
57:
58: For example the follow command line will send TCP packets with the
59: SYN flag on to the port 80 of the 192.168.0.0/16 address space:
60:
61: hping 192.168.x.x --rand-dest -p 80 -S
62:
63: Every occurrence of 'x' is substituted with a random number
64: in the 0-255 range.
65:
66: . The new feature rand-source allows to send packets with random
67: source addresses. Useful to test some DoS condition against firewalls
68: or TCP/IP stacks that implements some per-IP basis information
69: recording.
70:
71: . The output was enhanced and fixed a bit.
72:
73: . The "force incremental dest port" option (++<port>) now works with UDP
74: packets and works better with TCP, since it is more selective
75: with the incoming responses.
76:
77: . Now you should be really able to set the sequence and acknowledge
78: number of the TCP packets. The rc1 code was broken because
79: atoi() was used to get a long unsigned value.
80:
81: . The documentation (and the french translation) was updated
82: to reflect the changes.
83:
84: === release candidate 1 news
85:
86: . Now hping works better on BSD, and works on Solaris. It should
87: be many times simplest to port it to an unsupported platform.
88: Problems with systems that uses 32bit pids are now fixed.
89:
90: . The output is different to be more parseable and compact, example:
91:
92: len=46 ip=192.168.1.1 flags=RA DF seq=0 ttl=255 id=0 win=0 rtt=0.5 ms
93:
94: now the presence of the Don't fragment IP flag is signaled with 'DF'.
95: all the fields with a value are in the form 'field=value'.
96:
97: . To specify the outgoing interface with -I is no longer needed,
98: hping will try to detect the right interface according to the
99: system routing table. Of course you can override it using -I.
100:
101: . Instead to specify -i u10000 to get a speed of ten packets for second
102: you can just use --fast.
103:
104: . Now --traceroute (-T) implies --ttl 1. You can override this using --ttl.
105:
106: . Using hping as traceroute you have now RTT informations about the
107: hops.
108:
109: . You can monitor a specific hop in traceroute mode, using the following
110: syntax:
111:
112: hping2 -T www.yahoo.com --tr-keep-ttl --ttl 5
113:
114: see the output:
115:
116: HPING www.yahoo.com (ippp0 64.58.76.177): NO FLAGS are set, 40 headers + 0 dat
117: a bytes
118: 5->TTL 0 during transit from 144.232.234.57 (sl-gw18-nyc-2-2.sprintlink.net)
119: 5->RTT was: 136.9 ms
120: 5->TTL 0 during transit from 144.232.234.57 (sl-gw18-nyc-2-2.sprintlink.net)
121: 5->RTT was: 136.8 ms
122: 5->TTL 0 during transit from 144.232.234.57 (sl-gw18-nyc-2-2.sprintlink.net)
123: 5->RTT was: 136.9 ms
124: 5->TTL 0 during transit from 144.232.234.57 (sl-gw18-nyc-2-2.sprintlink.net)
125: 5->RTT was: 136.7 ms
126:
127: --- www.yahoo.com hping statistic ---
128: 4 packets tramitted, 0 packets received, 100% packet loss
129: round-trip min/avg/max = 136.7/136.8/136.9 ms
130:
131: you get only information about the 5 hop, after Ctrl+C the round-trip
132: min/avg/max is calculated using the rtt of this hop.
133:
134: . Using the option --tr-stop you can obtain that hping will exit
135: when the first matching packet that isn't an ICMP time exceeded
136: in transit is received, like the original traceroute. Without
137: this hping continue to send packets to the target host forever.
138:
139: . You can use --tr-no-rtt to suppress the rtt information in traceroute
140: mode.
141:
142: . With the --tcp-timestamp feature you can guess the uptime of some
143: remote systems. Example:
144:
145: HPING www.hping.org (ippp0 192.70.106.166): S set, 40 headers + 0 data bytes
146: 56 bytes from 192.70.106.166: flags=SA seq=0 ttl=49 id=28881 win=16080 rtt=105.0 ms
147: TCP timestamp: 258597761
148:
149: 56 bytes from 192.70.106.166: flags=SA seq=1 ttl=49 id=28882 win=16080 rtt=105.4 ms
150: TCP timestamp: 258597860
151: HZ seems 100
152: System uptime seems: 29 days, 22 hours, 19 minutes, 38 seconds
153:
154: 56 bytes from 192.70.106.166: flags=SA seq=2 ttl=49 id=28883 win=16080 rtt=105.1 ms
155: TCP timestamp: 258597960
156: HZ seems 100
157: System uptime seems: 29 days, 22 hours, 19 minutes, 39 seconds
158:
159:
160: --- www.hping.org hping statistic ---
161: 3 packets tramitted, 3 packets received, 0% packet loss
162: round-trip min/avg/max = 105.0/105.2/105.4 ms
163:
164: As you can see the first reply does not contain any uptime information
165: since at least two packets are needed to estimate the increment frequency
166: of the timestamp timer (that is HZ in the output).
167:
168: . You can now use ICMP timestamp and address subnet mask requests.
169: Two shortcut are provided to use they: --icmp-ts and --icmp-addr.
170:
171: . Now the sequence number handling is revisited to allow hping to
172: show the right rtt info even if the sequence number overflows.
173:
174: . Now hping should never (hopefully) SIGBUS on sparc.
175:
176: I hope you will find hping better to use and more powerful, these enhancements
177: were implemented thanks to many people that helped a lot with code and
178: new ideas, see the CHANGES file for more information and credits.
179:
180: have fun,
181: antirez
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>