1NPING(1) Nping Reference Guide NPING(1)
2
3
4
6 nping - Network packet generation tool / ping utility
7
9 nping [Options] {targets}
10
12 Nping is an open-source tool for network packet generation, response
13 analysis and response time measurement. Nping allows users to generate
14 network packets of a wide range of protocols, letting them tune
15 virtually any field of the protocol headers. While Nping can be used as
16 a simple ping utility to detect active hosts, it can also be used as a
17 raw packet generator for network stack stress tests, ARP poisoning,
18 Denial of Service attacks, route tracing, and other purposes.
19
20 Additionally, Nping offers a special mode of operation called the "Echo
21 Mode", that lets users see how the generated probes change in transit,
22 revealing the differences between the transmitted packets and the
23 packets received at the other end. See section "Echo Mode" for details.
24
25 The output from Nping is a list of the packets that are being sent and
26 received. The level of detail depends on the options used.
27
28 A typical Nping execution is shown in Example 1. The only Nping
29 arguments used in this example are -c, to specify the number of times
30 to target each host, --tcp to specify TCP Probe Mode, -p 80,433 to
31 specify the target ports; and then the two target hostnames.
32
33 Example 1. A representative Nping execution
34
35 # nping -c 1 --tcp -p 80,433 scanme.nmap.org google.com
36
37 Starting Nping ( https://nmap.org/nping )
38 SENT (0.0120s) TCP 96.16.226.135:50091 > 64.13.134.52:80 S ttl=64 id=52072 iplen=40 seq=1077657388 win=1480
39 RCVD (0.1810s) TCP 64.13.134.52:80 > 96.16.226.135:50091 SA ttl=53 id=0 iplen=44 seq=4158134847 win=5840 <mss 1460>
40 SENT (1.0140s) TCP 96.16.226.135:50091 > 74.125.45.100:80 S ttl=64 id=13932 iplen=40 seq=1077657388 win=1480
41 RCVD (1.1370s) TCP 74.125.45.100:80 > 96.16.226.135:50091 SA ttl=52 id=52913 iplen=44 seq=2650443864 win=5720 <mss 1430>
42 SENT (2.0140s) TCP 96.16.226.135:50091 > 64.13.134.52:433 S ttl=64 id=8373 iplen=40 seq=1077657388 win=1480
43 SENT (3.0140s) TCP 96.16.226.135:50091 > 74.125.45.100:433 S ttl=64 id=23624 iplen=40 seq=1077657388 win=1480
44
45 Statistics for host scanme.nmap.org (64.13.134.52):
46 | Probes Sent: 2 | Rcvd: 1 | Lost: 1 (50.00%)
47 |_ Max rtt: 169.720ms | Min rtt: 169.720ms | Avg rtt: 169.720ms
48 Statistics for host google.com (74.125.45.100):
49 | Probes Sent: 2 | Rcvd: 1 | Lost: 1 (50.00%)
50 |_ Max rtt: 122.686ms | Min rtt: 122.686ms | Avg rtt: 122.686ms
51 Raw packets sent: 4 (160B) | Rcvd: 2 (92B) | Lost: 2 (50.00%)
52 Tx time: 3.00296s | Tx bytes/s: 53.28 | Tx pkts/s: 1.33
53 Rx time: 3.00296s | Rx bytes/s: 30.64 | Rx pkts/s: 0.67
54 Nping done: 2 IP addresses pinged in 4.01 seconds
55
56 The newest version of Nping can be obtained with Nmap at
57 https://nmap.org. The newest version of this man page is available at
58 https://nmap.org/book/nping-man.html.
59
60 -->
61 .SH "OPTIONS SUMMARY"
62
63 This options summary is printed when Nping is run with no arguments. It
64 helps people remember the most common options, but is no substitute for
65 the in-depth documentation in the rest of this manual. Some obscure
66 options aren't even included here.
67
68 Nping 0.7.92SVN ( https://nmap.org/nping )
69 Usage: nping [Probe mode] [Options] {target specification}
70
71 TARGET SPECIFICATION:
72 Targets may be specified as hostnames, IP addresses, networks, etc.
73 Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.*.1-24
74 PROBE MODES:
75 --tcp-connect : Unprivileged TCP connect probe mode.
76 --tcp : TCP probe mode.
77 --udp : UDP probe mode.
78 --icmp : ICMP probe mode.
79 --arp : ARP/RARP probe mode.
80 --tr, --traceroute : Traceroute mode (can only be used with
81 TCP/UDP/ICMP modes).
82 TCP CONNECT MODE:
83 -p, --dest-port <port spec> : Set destination port(s).
84 -g, --source-port <portnumber> : Try to use a custom source port.
85 TCP PROBE MODE:
86 -g, --source-port <portnumber> : Set source port.
87 -p, --dest-port <port spec> : Set destination port(s).
88 --seq <seqnumber> : Set sequence number.
89 --flags <flag list> : Set TCP flags (ACK,PSH,RST,SYN,FIN...)
90 --ack <acknumber> : Set ACK number.
91 --win <size> : Set window size.
92 --badsum : Use a random invalid checksum.
93 UDP PROBE MODE:
94 -g, --source-port <portnumber> : Set source port.
95 -p, --dest-port <port spec> : Set destination port(s).
96 --badsum : Use a random invalid checksum.
97 ICMP PROBE MODE:
98 --icmp-type <type> : ICMP type.
99 --icmp-code <code> : ICMP code.
100 --icmp-id <id> : Set identifier.
101 --icmp-seq <n> : Set sequence number.
102 --icmp-redirect-addr <addr> : Set redirect address.
103 --icmp-param-pointer <pnt> : Set parameter problem pointer.
104 --icmp-advert-lifetime <time> : Set router advertisement lifetime.
105 --icmp-advert-entry <IP,pref> : Add router advertisement entry.
106 --icmp-orig-time <timestamp> : Set originate timestamp.
107 --icmp-recv-time <timestamp> : Set receive timestamp.
108 --icmp-trans-time <timestamp> : Set transmit timestamp.
109 ARP/RARP PROBE MODE:
110 --arp-type <type> : Type: ARP, ARP-reply, RARP, RARP-reply.
111 --arp-sender-mac <mac> : Set sender MAC address.
112 --arp-sender-ip <addr> : Set sender IP address.
113 --arp-target-mac <mac> : Set target MAC address.
114 --arp-target-ip <addr> : Set target IP address.
115 IPv4 OPTIONS:
116 -S, --source-ip : Set source IP address.
117 --dest-ip <addr> : Set destination IP address (used as an
118 alternative to {target specification} ).
119 --tos <tos> : Set type of service field (8bits).
120 --id <id> : Set identification field (16 bits).
121 --df : Set Don't Fragment flag.
122 --mf : Set More Fragments flag.
123 --evil : Set Reserved / Evil flag.
124 --ttl <hops> : Set time to live [0-255].
125 --badsum-ip : Use a random invalid checksum.
126 --ip-options <S|R [route]|L [route]|T|U ...> : Set IP options
127 --ip-options <hex string> : Set IP options
128 --mtu <size> : Set MTU. Packets get fragmented if MTU is
129 small enough.
130 IPv6 OPTIONS:
131 -6, --IPv6 : Use IP version 6.
132 --dest-ip : Set destination IP address (used as an
133 alternative to {target specification}).
134 --hop-limit : Set hop limit (same as IPv4 TTL).
135 --traffic-class <class> : : Set traffic class.
136 --flow <label> : Set flow label.
137 ETHERNET OPTIONS:
138 --dest-mac <mac> : Set destination mac address. (Disables
139 ARP resolution)
140 --source-mac <mac> : Set source MAC address.
141 --ether-type <type> : Set EtherType value.
142 PAYLOAD OPTIONS:
143 --data <hex string> : Include a custom payload.
144 --data-string <text> : Include a custom ASCII text.
145 --data-length <len> : Include len random bytes as payload.
146 ECHO CLIENT/SERVER:
147 --echo-client <passphrase> : Run Nping in client mode.
148 --echo-server <passphrase> : Run Nping in server mode.
149 --echo-port <port> : Use custom <port> to listen or connect.
150 --no-crypto : Disable encryption and authentication.
151 --once : Stop the server after one connection.
152 --safe-payloads : Erase application data in echoed packets.
153 TIMING AND PERFORMANCE:
154 Options which take <time> are in seconds, or append 'ms' (milliseconds),
155 's' (seconds), 'm' (minutes), or 'h' (hours) to the value (e.g. 30m, 0.25h).
156 --delay <time> : Adjust delay between probes.
157 --rate <rate> : Send num packets per second.
158 MISC:
159 -h, --help : Display help information.
160 -V, --version : Display current version number.
161 -c, --count <n> : Stop after <n> rounds.
162 -e, --interface <name> : Use supplied network interface.
163 -H, --hide-sent : Do not display sent packets.
164 -N, --no-capture : Do not try to capture replies.
165 --privileged : Assume user is fully privileged.
166 --unprivileged : Assume user lacks raw socket privileges.
167 --send-eth : Send packets at the raw Ethernet layer.
168 --send-ip : Send packets using raw IP sockets.
169 --bpf-filter <filter spec> : Specify custom BPF filter.
170 OUTPUT:
171 -v : Increment verbosity level by one.
172 -v[level] : Set verbosity level. E.g: -v4
173 -d : Increment debugging level by one.
174 -d[level] : Set debugging level. E.g: -d3
175 -q : Decrease verbosity level by one.
176 -q[N] : Decrease verbosity level N times
177 --quiet : Set verbosity and debug level to minimum.
178 --debug : Set verbosity and debug to the max level.
179 EXAMPLES:
180 nping scanme.nmap.org
181 nping --tcp -p 80 --flags rst --ttl 2 192.168.1.1
182 nping --icmp --icmp-type time --delay 500ms 192.168.254.254
183 nping --echo-server "public" -e wlan0 -vvv
184 nping --echo-client "public" echo.nmap.org --tcp -p1-1024 --flags ack
185
186 SEE THE MAN PAGE FOR MANY MORE OPTIONS, DESCRIPTIONS, AND EXAMPLES
187
188
190 Everything on the Nping command line that isn't an option or an option
191 argument is treated as a target host specification. Nping uses the same
192 syntax for target specifications that Nmap does. The simplest case is a
193 single target given by IP address or hostname.
194
195 Nping supports CIDR-style addressing. You can append /numbits to an
196 IPv4 address or hostname and Nping will send probes to every IP address
197 for which the first numbits are the same as for the reference IP or
198 hostname given. For example, 192.168.10.0/24 would send probes to the
199 256 hosts between 192.168.10.0 (binary: 11000000 10101000 00001010
200 00000000) and 192.168.10.255 (binary: 11000000 10101000 00001010
201 11111111), inclusive. 192.168.10.40/24 would ping exactly the same
202 targets. Given that the host scanme.nmap.org is at the IP address
203 64.13.134.52, the specification scanme.nmap.org/16 would send probes to
204 the 65,536 IP addresses between 64.13.0.0 and 64.13.255.255. The
205 smallest allowed value is /0, which targets the whole Internet. The
206 largest value is /32, which targets just the named host or IP address
207 because all address bits are fixed.
208
209 CIDR notation is short but not always flexible enough. For example, you
210 might want to send probes to 192.168.0.0/16 but skip any IPs ending
211 with .0 or .255 because they may be used as subnet network and
212 broadcast addresses. Nping supports this through octet range
213 addressing. Rather than specify a normal IP address, you can specify a
214 comma-separated list of numbers or ranges for each octet. For example,
215 192.168.0-255.1-254 will skip all addresses in the range that end in .0
216 or .255, and 192.168.3-5,7.1 will target the four addresses
217 192.168.3.1, 192.168.4.1, 192.168.5.1, and 192.168.7.1. Either side of
218 a range may be omitted; the default values are 0 on the left and 255 on
219 the right. Using - by itself is the same as 0-255, but remember to use
220 0- in the first octet so the target specification doesn't look like a
221 command-line option. Ranges need not be limited to the final octets:
222 the specifier 0-.-.13.37 will send probes to all IP addresses on the
223 Internet ending in .13.37. This sort of broad sampling can be useful
224 for Internet surveys and research.
225
226 IPv6 addresses can only be specified by their fully qualified IPv6
227 address or hostname. CIDR and octet ranges aren't supported for IPv6
228 because they are rarely useful.
229
230 Nping accepts multiple host specifications on the command line, and
231 they don't need to be the same type. The command nping scanme.nmap.org
232 192.168.0.0/8 10.0.0,1,3-7.- does what you would expect.
233
235 Nping is designed to be very flexible and fit a wide variety of needs.
236 As with most command-line tools, its behavior can be adjusted using
237 command-line options. These general principles apply to option
238 arguments, unless stated otherwise.
239
240 Options that take integer numbers can accept values specified in
241 decimal, octal or hexadecimal base. When a number starts with 0x, it
242 will be treated as hexadecimal; when it simply starts with 0, it will
243 be treated as octal. Otherwise, Nping will assume the number has been
244 specified in base 10. Virtually all numbers that can be supplied from
245 the command line are unsigned so, as a general rule, the minimum value
246 is zero. Users may also specify the word random or rand to make Nping
247 generate a random value within the expected range.
248
249 IP addresses may be given as IPv4 addresses (e.g. 192.168.1.1), IPv6
250 addresses (e.g. 2001:db8:85a3::8e4c:760:7146), or hostnames, which
251 will be resolved using the default DNS server configured in the host
252 system.
253
254 Options that take MAC addresses accept the usual colon-separated 6 hex
255 byte format (e.g. 00:50:56:d4:01:98). Hyphens may also be used instead
256 of colons (e.g. 00-50-56-c0-00-08). The special word random or rand
257 sets a random address and the word broadcast or bcast sets
258 ff:ff:ff:ff:ff:ff.
259
261 Unlike other ping and packet generation tools, Nping supports multiple
262 target host and port specifications. While this provides great
263 flexibility, it is not obvious how Nping handles situations where there
264 is more than one host and/or more than one port to send probes to. This
265 section explains how Nping behaves in these cases.
266
267 When multiple target hosts are specified, Nping rotates among them in
268 round-robin fashion. This gives slow hosts more time to send their
269 responses before another probe is sent to them. Ports are also
270 scheduled using round robin. So, unless only one port is specified,
271 Nping never sends two probes to the same target host and port
272 consecutively.
273
274 The loop around targets is the “inner loop” and the loop around ports
275 is the “outer loop”. All targets will be sent a probe for a given port
276 before moving on to the next port. Between probes, Nping waits a
277 configurable amount of time called the “inter-probe delay”, which is
278 controlled by the --delay option. These examples show how it works.
279
280 # nping --tcp -c 2 1.1.1.1 -p 100-102
281
282 Starting Nping ( https://nmap.org/nping )
283 SENT (0.0210s) TCP 192.168.1.77 > 1.1.1.1:100
284 SENT (1.0230s) TCP 192.168.1.77 > 1.1.1.1:101
285 SENT (2.0250s) TCP 192.168.1.77 > 1.1.1.1:102
286 SENT (3.0280s) TCP 192.168.1.77 > 1.1.1.1:100
287 SENT (4.0300s) TCP 192.168.1.77 > 1.1.1.1:101
288 SENT (5.0320s) TCP 192.168.1.77 > 1.1.1.1:102
289
290 # nping --tcp -c 2 1.1.1.1 2.2.2.2 3.3.3.3 -p 8080
291
292 Starting Nping ( https://nmap.org/nping )
293 SENT (0.0230s) TCP 192.168.0.21 > 1.1.1.1:8080
294 SENT (1.0240s) TCP 192.168.0.21 > 2.2.2.2:8080
295 SENT (2.0260s) TCP 192.168.0.21 > 3.3.3.3:8080
296 SENT (3.0270s) TCP 192.168.0.21 > 1.1.1.1:8080
297 SENT (4.0290s) TCP 192.168.0.21 > 2.2.2.2:8080
298 SENT (5.0310s) TCP 192.168.0.21 > 3.3.3.3:8080
299
300 # nping --tcp -c 1 --delay 500ms 1.1.1.1 2.2.2.2 3.3.3.3 -p 137-139
301
302 Starting Nping ( https://nmap.org/nping )
303 SENT (0.0230s) TCP 192.168.0.21 > 1.1.1.1:137
304 SENT (0.5250s) TCP 192.168.0.21 > 2.2.2.2:137
305 SENT (1.0250s) TCP 192.168.0.21 > 3.3.3.3:137
306 SENT (1.5280s) TCP 192.168.0.21 > 1.1.1.1:138
307 SENT (2.0280s) TCP 192.168.0.21 > 2.2.2.2:138
308 SENT (2.5310s) TCP 192.168.0.21 > 3.3.3.3:138
309 SENT (3.0300s) TCP 192.168.0.21 > 1.1.1.1:139
310 SENT (3.5330s) TCP 192.168.0.21 > 2.2.2.2:139
311 SENT (4.0330s) TCP 192.168.0.21 > 3.3.3.3:139
312
314 Nping supports a wide variety of protocols. Although in some cases
315 Nping can automatically determine the mode from the options used, it is
316 generally a good idea to specify it explicitly.
317
318 --tcp-connect (TCP Connect mode)
319 TCP connect mode is the default mode when a user does not have raw
320 packet privileges. Instead of writing raw packets as most other
321 modes do, Nping asks the underlying operating system to establish a
322 connection with the target machine and port by issuing the connect
323 system call. This is the same high-level system call that web
324 browsers, P2P clients, and most other network-enabled applications
325 use to establish a connection. It is part of a programming
326 interface known as the Berkeley Sockets API. Rather than read raw
327 packet responses off the wire, Nping uses this API to obtain status
328 information on each connection attempt. For this reason, you will
329 not be able to see the contents of the packets that are sent or
330 received but only status information about the TCP connection
331 establishment taking place.
332
333 --tcp (TCP mode)
334 TCP is the mode that lets users create and send any kind of TCP
335 packet. TCP packets are sent embedded in IP packets that can also
336 be tuned. This mode can be used for many different purposes. For
337 example you could try to discover open ports by sending TCP SYN
338 messages without completing the three-way handshake. This technique
339 is often referred to as half-open scanning, because you don't open
340 a full TCP connection. You send a SYN packet, as if you are going
341 to open a real connection and then wait for a response. A SYN/ACK
342 indicates the port is open, while a RST indicates it's closed. If
343 no response is received one could assume that some intermediate
344 network device is filtering the responses. Another use could be to
345 see how a remote TCP/IP stack behaves when it receives a
346 non-RFC-compliant packet, like one with both SYN and RST flags set.
347 One could also do some evil by creating custom RST packets using an
348 spoofed IP address with the intent of closing an active TCP
349 connection.
350
351 --udp (UDP mode)
352 UDP mode can have two different behaviours. Under normal
353 circumstances, it lets users create custom IP/UDP packets. However,
354 if Nping is run by a user without raw packet privileges and no
355 changes to the default protocol headers are requested, then Nping
356 enters the unprivileged UDP mode which basically sends UDP packets
357 to the specified target hosts and ports using the sendto system
358 call. Note that in this unprivileged mode it is not possible to see
359 low-level header information of the packets on the wire but only
360 status information about the amount of bytes that are being
361 transmitted and received. UDP mode can be used to interact with any
362 UDP-based server. Examples are DNS servers, streaming servers,
363 online gaming servers, and port knocking/single-packet
364 authorization daemons.
365
366 --icmp (ICMP mode)
367 ICMP mode is the default mode when the user runs Nping with raw
368 packet privileges. Any kind of ICMP message can be created. The
369 default ICMP type is Echo, i.e., ping. ICMP mode can be used for
370 many different purposes, from a simple request for a timestamp or a
371 netmask to the transmission of fake destination unreachable
372 messages, custom redirects, and router advertisements.
373
374 --arp (ARP/RARP mode)
375 ARP lets you create and send a few different ARP-related packets.
376 These include ARP, RARP, DRARP, and InARP requests and replies.
377 This mode can ban be used to perform low-level host discovery, and
378 conduct ARP-cache poisoning attacks.
379
380 --traceroute (Traceroute mode)
381 Traceroute is not a mode by itself but a complement to TCP, UDP,
382 and ICMP modes. When this option is specified Nping will set the IP
383 TTL value of the first probe to 1. When the next router receives
384 the packet it will drop it due to the expiration of the TTL and it
385 will generate an ICMP destination unreachable message. The next
386 probe will have a TTL of 2 so now the first router will forward the
387 packet while the second router will be the one that drops the
388 packet and generates the ICMP message. The third probe will have a
389 TTL value of 3 and so on. By examining the source addresses of all
390 those ICMP Destination Unreachable messages it is possible to
391 determine the path that the probes take until they reach their
392 final destination.
393
395 -p port_spec, --dest-port port_spec (Target ports)
396 This option specifies which ports you want to try to connect to. It
397 can be a single port, a comma-separated list of ports (e.g.
398 80,443,8080), a range (e.g. 1-1023), and any combination of those
399 (e.g. 21-25,80,443,1024-2048). The beginning and/or end values of
400 a range may be omitted, causing Nping to use 1 and 65535,
401 respectively. So you can specify -p- to target ports from 1 through
402 65535. Using port zero is allowed if you specify it explicitly.
403
404 -g portnumber, --source-port portnumber (Spoof source port)
405 This option asks Nping to use the specified port as source port for
406 the TCP connections. Note that this might not work on all systems
407 or may require root privileges. Specified value must be an integer
408 in the range [0–65535].
409
411 -p port_spec, --dest-port port_spec (Target ports)
412 This option specifies which destination ports you want to send
413 probes to. It can be a single port, a comma-separated list of ports
414 (e.g. 80,443,8080), a range (e.g. 1-1023), and any combination of
415 those (e.g. 21-25,80,443,1024-2048). The beginning and/or end
416 values of a range may be omitted, causing Nping to use 1 and 65535,
417 respectively. So you can specify -p- to target ports from 1 through
418 65535. Using port zero is allowed if you specify it explicitly.
419
420 -g portnumber, --source-port portnumber (Spoof source port)
421 This option asks Nping to use the specified port as source port for
422 the TCP connections. Note that this might not work on all systems
423 or may require root privileges. Specified value must be an integer
424 in the range [0–65535].
425
426 --seq seqnumber (Sequence Number)
427 Specifies the TCP sequence number. In SYN packets this is the
428 initial sequence number (ISN). In a normal transmission this
429 corresponds to the sequence number of the first byte of data in the
430 segment. seqnumber must be a number in the range [0–4294967295].
431
432 --flags flags (TCP Flags)
433 This option specifies which flags should be set in the TCP packet.
434 flags may be specified in three different ways:
435
436 1. As a comma-separated list of flags, e.g. --flags syn,ack,rst
437
438 2. As a list of one-character flag initials, e.g. --flags SAR
439 tells Nping to set flags SYN, ACK, and RST.
440
441 3. As an 8-bit hexadecimal number, where the supplied number is
442 the exact value that will be placed in the flags field of the
443 TCP header. The number should start with the prefix 0x and
444 should be in the range [0x00–0xFF], e.g. --flags 0x20 sets the
445 URG flag as 0x20 corresponds to binary 00100000 and the URG
446 flag is represented by the third bit.
447
448 There are 8 possible flags to set: CWR, ECN, URG, ACK, PSH, RST,
449 SYN, and FIN. The special value ALL means to set all flags. NONE
450 means to set no flags. It is important that if you don't want any
451 flag to be set, you request it explicitly because in some cases the
452 SYN flag may be set by default. Here is a brief description of the
453 meaning of each flag:
454
455 CWR (Congestion Window Reduced)
456 Set by an ECN-Capable sender when it reduces its congestion
457 window (due to a retransmit timeout, a fast retransmit or in
458 response to an ECN notification.
459
460 ECN (Explicit Congestion Notification)
461 During the three-way handshake it indicates that sender is
462 capable of performing explicit congestion notification.
463 Normally it means that a packet with the IP Congestion
464 Experienced flag set was received during normal transmission.
465 See RFC 3168 for more information.
466
467 URG (Urgent)
468 Segment is urgent and the urgent pointer field carries valid
469 information.
470
471 ACK (Acknowledgement)
472 The segment carries an acknowledgement and the value of the
473 acknowledgement number field is valid and contains the next
474 sequence number that is expected from the receiver.
475
476 PSH (Push)
477 The data in this segment should be immediately pushed to the
478 application layer on arrival.
479
480 RST (Reset)
481 There was some problem and the sender wants to abort the
482 connection.
483
484 SYN (Synchronize)
485 The segment is a request to synchronize sequence numbers and
486 establish a connection. The sequence number field contains the
487 sender's initial sequence number.
488
489 FIN (Finish)
490 The sender wants to close the connection.
491
492 --win size (Window Size)
493 Specifies the TCP window size, this is, the number of octets the
494 sender of the segment is willing to accept from the receiver at one
495 time. This is usually the size of the reception buffer that the OS
496 allocates for a given connection. size must be a number in the
497 range [0–65535].
498
499 --badsum (Invalid Checksum)
500 Asks Nping to use an invalid TCP checksum for the packets sent to
501 target hosts. Since virtually all host IP stacks properly drop
502 these packets, any responses received are likely coming from a
503 firewall or an IDS that didn't bother to verify the checksum. For
504 more details on this technique, see https://nmap.org/p60-12.html.
505
507 -p port_spec, --dest-port port_spec (Target ports)
508 This option specifies which ports you want UDP datagrams to be sent
509 to. It can be a single port, a comma-separated list of ports (e.g.
510 80,443,8080), a range (e.g. 1-1023), and any combination of those
511 (e.g. 21-25,80,443,1024-2048). The beginning and/or end values of
512 a range may be omitted, causing Nping to use 1 and 65535,
513 respectively. So you can specify -p- to target ports from 1 through
514 65535. Using port zero is allowed if you specify it explicitly.
515
516 -g portnumber, --source-port portnumber (Spoof source port)
517 This option asks Nping to use the specified port as source port for
518 the transmitted datagrams. Note that this might not work on all
519 systems or may require root privileges. Specified value must be an
520 integer in the range [0–65535].
521
522 --badsum (Invalid Checksum)
523 Asks Nping to use an invalid UDP checksum for the packets sent to
524 target hosts. Since virtually all host IP stacks properly drop
525 these packets, any responses received are likely coming from a
526 firewall or an IDS that didn't bother to verify the checksum. For
527 more details on this technique, see https://nmap.org/p60-12.html.
528
530 --icmp-type type (ICMP type)
531 This option specifies which type of ICMP messages should be
532 generated. type can be supplied in two different ways. You can use
533 the official type numbers assigned by IANA[1] (e.g. --icmp-type 8
534 for ICMP Echo Request), or you can use any of the mnemonics listed
535 in the section called “ICMP Types”.
536
537 --icmp-code code (ICMP code)
538 This option specifies which ICMP code should be included in the
539 generated ICMP messages. code can be supplied in two different
540 ways. You can use the official code numbers assigned by IANA[1]
541 (e.g. --icmp-code 1 for Fragment Reassembly Time Exceeded), or you
542 can use any of the mnemonics listed in the section called “ICMP
543 Codes”.
544
545 --icmp-id id (ICMP identifier)
546 This option specifies the value of the identifier used in some of
547 the ICMP messages. In general it is used to match request and reply
548 messages. id must be a number in the range [0–65535].
549
550 --icmp-seq seq (ICMP sequence)
551 This option specifies the value of the sequence number field used
552 in some ICMP messages. In general it is used to match request and
553 reply messages. id must be a number in the range [0–65535].
554
555 --icmp-redirect-addr addr (ICMP Redirect address)
556 This option sets the address field in ICMP Redirect messages. In
557 other words, it sets the IP address of the router that should be
558 used when sending IP datagrams to the original destination. addr
559 can be either an IPv4 address or a hostname.
560
561 --icmp-param-pointer pointer (ICMP Parameter Problem pointer)
562 This option specifies the pointer that indicates the location of
563 the problem in ICMP Parameter Problem messages. pointer should be
564 a number in the range [0–255]. Normally this option is only used
565 when ICMP code is set to 0 ("Pointer indicates the error").
566
567 --icmp-advert-lifetime ttl (ICMP Router Advertisement Lifetime)
568 This option specifies the router advertisement lifetime, this is,
569 the number of seconds the information carried in an ICMP Router
570 Advertisement can be considered valid for. ttl must be a positive
571 integer in the range [0–65535].
572
573 --icmp-advert-entry addr,pref (ICMP Router Advertisement Entry)
574 This option adds a Router Advertisement entry to an ICMP Router
575 Advertisement message. The parameter must be two values separated
576 by a comma. addr is the router's IP and can be specified either as
577 an IP address in dot-decimal notation or as a hostname. pref is
578 the preference level for the specified IP. It must be a number in
579 the range [0–4294967295]. An example is --icmp-advert-entry
580 192.168.128.1,3.
581
582 --icmp-orig-time timestamp (ICMP Originate Timestamp)
583 This option sets the Originate Timestamp in ICMP Timestamp
584 messages. The Originate Timestamp is expressed as the number of
585 milliseconds since midnight UTC and it corresponds to the time the
586 sender last touched the Timestamp message before its transmission.
587 timestamp can be specified as a regular time (e.g. 10s, 3h,
588 1000ms), or the special string now. You can add or subtract values
589 from now, for example --icmp-orig-time now-2s, --icmp-orig-time
590 now+1h, --icmp-orig-time now+200ms.
591
592 --icmp-recv-time timestamp (ICMP Receive Timestamp)
593 This option sets the Receive Timestamp in ICMP Timestamp messages.
594 The Receive Timestamp is expressed as the number of milliseconds
595 since midnight UTC and it corresponds to the time the echoer first
596 touched the Timestamp message on receipt. timestamp is as with
597 --icmp-orig-time.
598
599 --icmp-trans-time timestamp (ICMP Transmit Timestamp)
600 This option sets the Transmit Timestamp in ICMP Timestamp messages.
601 The Transmit Timestamp is expressed as the number of milliseconds
602 since midnight UTC and it corresponds to the time the echoer last
603 touched the Timestamp message before its transmission. timestamp
604 is as with --icmp-orig-time.
605
606 ICMP Types
607 These identifiers may be used as mnemonics for the ICMP type numbers
608 given to the --icmp-type option. In general there are three forms of
609 each identifier: the full name (e.g. destination-unreachable), the
610 short name (e.g. dest-unr), or the initials (e.g. du). In ICMP types
611 that request something, the word "request" is omitted.
612
613 echo-reply, echo-rep, er
614 Echo Reply (type 0). This message is sent in response to an Echo
615 Request message.
616
617 destination-unreachable, dest-unr, du
618 Destination Unreachable (type 3). This message indicates that a
619 datagram could not be delivered to its destination.
620
621 source-quench, sour-que, sq
622 Source Quench (type 4). This message is used by a congested IP
623 device to tell other device that is sending packets too fast and
624 that it should slow down.
625
626 redirect, redi, r
627 Redirect (type 5). This message is normally used by routers to
628 inform a host that there is a better route to use for sending
629 datagrams. See also the --icmp-redirect-addr option.
630
631 echo-request, echo, e
632 Echo Request (type 8). This message is used to test the
633 connectivity of another device on a network.
634
635 router-advertisement, rout-adv, ra
636 Router Advertisement (type 9). This message is used by routers to
637 let hosts know of their existence and capabilities. See also the
638 --icmp-advert-lifetime option.
639
640 router-solicitation, rout-sol, rs
641 Router Solicitation (type 10). This message is used by hosts to
642 request Router Advertisement messages from any listening routers.
643
644 time-exceeded, time-exc, te
645 Time Exceeded (type 11). This message is generated by some
646 intermediate device (normally a router) to indicate that a datagram
647 has been discarded before reaching its destination because the IP
648 TTL expired.
649
650 parameter-problem, member-pro, pp
651 Parameter Problem (type 12). This message is used when a device
652 finds a problem with a parameter in an IP header and it cannot
653 continue processing it. See also the --icmp-param-pointer option.
654
655 timestamp, time, tm
656 Timestamp Request (type 13). This message is used to request a
657 device to send a timestamp value for propagation time calculation
658 and clock synchronization. See also the --icmp-orig-time,
659 --icmp-recv-time, and --icmp-trans-time.
660
661 timestamp-reply, time-rep, tr
662 Timestamp Reply (type 14). This message is sent in response to a
663 Timestamp Request message.
664
665 information, info, i
666 Information Request (type 15). This message is now obsolete but it
667 was originally used to request configuration information from
668 another device.
669
670 information-reply, info-rep, ir
671 Information Reply (type 16). This message is now obsolete but it
672 was originally sent in response to an Information Request message
673 to provide configuration information.
674
675 mask-request, mask, m
676 Address Mask Request (type 17). This message is used to ask a
677 device to send its subnet mask.
678
679 mask-reply, mask-rep, mr
680 Address Mask Reply (type 18). This message contains a subnet mask
681 and is sent in response to a Address Mask Request message.
682
683 traceroute, trace, tc
684 Traceroute (type 30). This message is normally sent by an
685 intermediate device when it receives an IP datagram with a
686 traceroute option. ICMP Traceroute messages are still experimental,
687 see RFC 1393 for more information.
688
689 ICMP Codes
690 These identifiers may be used as mnemonics for the ICMP code numbers
691 given to the --icmp-code option. They are listed by the ICMP type they
692 correspond to.
693
694 Destination Unreachable
695 network-unreachable, netw-unr, net
696 Code 0. Datagram could not be delivered to its destination
697 network (probably due to some routing problem).
698
699 host-unreachable, host-unr, host
700 Code 1. Datagram was delivered to the destination network but
701 it was impossible to reach the specified host (probably due to
702 some routing problem).
703
704 protocol-unreachable, prot-unr, proto
705 Code 2. The protocol specified in the Protocol field of the IP
706 datagram is not supported by the host to which the datagram was
707 delivered.
708
709 port-unreachable, port-unr, port
710 Code 3. The TCP/UDP destination port was invalid.
711
712 needs-fragmentation, need-fra, frag
713 Code 4. Datagram had the DF bit set but it was too large for
714 the MTU of the next physical network so it had to be dropped.
715
716 source-route-failed, sour-rou, routefail
717 Code 5. IP datagram had a Source Route option but a router
718 couldn't pass it to the next hop.
719
720 network-unknown, netw-unk, net?
721 Code 6. Destination network is unknown. This code is never
722 used. Instead, Network Unreachable is used.
723
724 host-unknown, host-unk, host?
725 Code 7. Specified host is unknown. Usually generated by a
726 router local to the destination host to inform of a bad
727 address.
728
729 host-isolated, host-iso, isolated
730 Code 8. Source Host Isolated. Not used.
731
732 network-prohibited, netw-pro, !net
733 Code 9. Communication with destination network is
734 administratively prohibited (source device is not allowed to
735 send packets to the destination network).
736
737 host-prohibited, host-pro, !host
738 Code 10. Communication with destination host is
739 administratively prohibited. (The source device is allowed to
740 send packets to the destination network but not to the
741 destination device.)
742
743 network-tos, unreachable-network-tos, netw-tos, tosnet
744 Code 11. Destination network unreachable because it cannot
745 provide the type of service specified in the IP TOS field.
746
747 host-tos, unreachable-host-tos, toshost
748 Code 12. Destination host unreachable because it cannot provide
749 the type of service specified in the IP TOS field.
750
751 communication-prohibited, comm-pro, !comm
752 Code 13. Datagram could not be forwarded due to filtering that
753 blocks the message based on its contents.
754
755 host-precedence-violation, precedence-violation, prec-vio,
756 violation
757 Code 14. Precedence value in the IP TOS field is not permitted.
758
759 precedence-cutoff, prec-cut, cutoff
760 Code 15. Precedence value in the IP TOS field is lower than the
761 minimum allowed for the network.
762
763 Redirect
764 redirect-network, redi-net, net
765 Code 0. Redirect all future datagrams with the same destination
766 network as the original datagram, to the router specified in
767 the Address field. The use of this code is prohibited by RFC
768 1812.
769
770 redirect-host, redi-host, host
771 Code 1. Redirect all future datagrams with the same destination
772 host as the original datagram, to the router specified in the
773 Address field.
774
775 redirect-network-tos, redi-ntos, redir-ntos
776 Code 2. Redirect all future datagrams with the same destination
777 network and IP TOS value as the original datagram, to the
778 router specified in the Address field. The use of this code is
779 prohibited by RFC 1812.
780
781 redirect-host-tos, redi-htos, redir-htos
782 Code 3. Redirect all future datagrams with the same destination
783 host and IP TOS value as the original datagram, to the router
784 specified in the Address field.
785
786 Router Advertisement
787 normal-advertisement, norm-adv, normal, zero, default, def
788 Code 0. Normal router advertisement. In Mobile IP: Mobility
789 agent can act as a router for IP datagrams not related to
790 mobile nodes.
791
792 not-route-common-traffic, not-rou, mobile-ip, !route,
793 !commontraffic
794 Code 16. Used for Mobile IP. The mobility agent does not route
795 common traffic. All foreign agents must forward to a default
796 router any datagrams received from a registered mobile node
797
798 Time Exceeded
799 ttl-exceeded-in-transit, ttl-exc, ttl-transit
800 Code 0. IP Time To Live expired during transit.
801
802 fragment-reassembly-time-exceeded, frag-exc, frag-time
803 Code 1. Fragment reassembly time has been exceeded.
804
805 Parameter Problem
806 pointer-indicates-error, poin-ind, pointer
807 Code 0. The pointer field indicates the location of the
808 problem. See the --icmp-param-pointer option.
809
810 missing-required-option, miss-option, option-missing
811 Code 1. IP datagram was expected to have an option that is not
812 present.
813
814 bad-length, bad-len, badlen
815 Code 2. The length of the IP datagram is incorrect.
816
818 --arp-type type (ICMP Type)
819 This option specifies which type of ARP messages should be
820 generated. type can be supplied in two different ways. You can use
821 the official numbers assigned by IANA[2] (e.g. --arp-type 1 for
822 ARP Request), or you can use one of the mnemonics from the section
823 called “ARP Types”.
824
825 --arp-sender-mac mac (Sender MAC address)
826 This option sets the Sender Hardware Address field of the ARP
827 header. Although ARP supports many types of link layer addresses,
828 currently Nping only supports MAC addresses. mac must be specified
829 using the traditional MAC notation (e.g. 00:0a:8a:32:f4:ae). You
830 can also use hyphens as separators (e.g. 00-0a-8a-32-f4-ae).
831
832 --arp-sender-ip addr (Sender IP address)
833 This option sets the Sender IP field of the ARP header. addr can
834 be given as an IPv4 address or a hostname.
835
836 --arp-target-mac mac (target MAC address)
837 This option sets the Target Hardware Address field of the ARP
838 header.
839
840 --arp-target-ip addr (target ip address)
841 This option sets the Target IP field of the ARP header.
842
843 ARP Types
844 These identifiers may be used as mnemonics for the ARP type numbers
845 given to the --arp-type option.
846
847 arp-request, arp, a
848 ARP Request (type 1). ARP requests are used to translate network
849 layer addresses (normally IP addresses) to link layer addresses
850 (usually MAC addresses). Basically, and ARP request is a
851 broadcasted message that asks the host in the same network segment
852 that has a given IP address to provide its MAC address.
853
854 arp-reply, arp-rep, ar
855 ARP Reply (type 2). An ARP reply is a message that a host sends in
856 response to an ARP request to provide its link layer address.
857
858 rarp-request, rarp, r
859 RARP Requests (type 3). RARP requests are used to translate a link
860 layer address (normally a MAC address) to a network layer address
861 (usually an IP address). Basically a RARP request is a broadcasted
862 message sent by a host that wants to know his own IP address
863 because it doesn't have any. It was the first protocol designed to
864 solve the bootstrapping problem. However, RARP is now obsolete and
865 DHCP is used instead. For more information about RARP see RFC 903.
866
867 rarp-reply, rarp-rep, rr
868 RARP Reply (type 4). A RARP reply is a message sent in response to
869 a RARP request to provide an IP address to the host that sent the
870 RARP request in the first place.
871
872 drarp-request, drarp, d
873 Dynamic RARP Request (type 5). Dynamic RARP is an extension to RARP
874 used to obtain or assign a network layer address from a fixed link
875 layer address. DRARP was used mainly in Sun Microsystems platforms
876 in the late 90's but now it's no longer used. See RFC 1931 for more
877 information.
878
879 drarp-reply, drarp-rep, dr
880 Dynamic RARP Reply (type 6). A DRARP reply is a message sent in
881 response to a RARP request to provide network layer address.
882
883 drarp-error, drarp-err, de
884 DRARP Error (type 7). DRARP Error messages are usually sent in
885 response to DRARP requests to inform of some error. In DRARP Error
886 messages, the Target Protocol Address field is used to carry an
887 error code (usually in the first byte). The error code is intended
888 to tell why no target protocol address is being returned. For more
889 information see RFC 1931.
890
891 inarp-request, inarp, i
892 Inverse ARP Request (type 8). InARP requests are used to translate
893 a link layer address to a network layer address. It is similar to
894 RARP request but in this case, the sender of the InARP request
895 wants to know the network layer address of another node, not its
896 own address. InARP is mainly used in Frame Relay and ATM networks.
897 For more information see RFC 2390.
898
899 inarp-reply, inarp-rep, ir
900 Inverse ARP Reply (type 9). InARP reply messages are sent in
901 response to InARP requests to provide the network layer address
902 associated with the host that has a given link layer address.
903
904 arp-nak, an
905 ARP NAK (type 10). ARP NAK messages are an extension to the ATMARP
906 protocol and they are used to improve the robustness of the ATMARP
907 server mechanism. With ARP NAK, a client can determine the
908 difference between a catastrophic server failure and an ATMARP
909 table lookup failure. See RFC 1577 for more information.
910
912 -S addr, --source-ip addr (Source IP Address)
913 Sets the source IP address. This option lets you specify a custom
914 IP address to be used as source IP address in sent packets. This
915 allows spoofing the sender of the packets. addr can be an IPv4
916 address or a hostname.
917
918 --dest-ip addr (Destination IP Address)
919 Adds a target to Nping's target list. This option is provided for
920 consistency but its use is deprecated in favor of plain target
921 specifications. See the section called “TARGET SPECIFICATION”.
922
923 --tos tos (Type of Service)
924 Sets the IP TOS field. The TOS field is used to carry information
925 to provide quality of service features. It is normally used to
926 support a technique called Differentiated Services. See RFC 2474
927 for more information. tos must be a number in the range [0–255].
928
929 --id id (Identification)
930 Sets the IPv4 Identification field. The Identification field is a
931 16-bit value that is common to all fragments belonging to a
932 particular message. The value is used by the receiver to reassemble
933 the original message from the fragments received. id must be a
934 number in the range [0–65535].
935
936 --df (Don't Fragment)
937 Sets the Don't Fragment bit in sent packets. When an IP datagram
938 has its DF flag set, intermediate devices are not allowed to
939 fragment it so if it needs to travel across a network with a MTU
940 smaller that datagram length the datagram will have to be dropped.
941 Normally an ICMP Destination Unreachable message is generated and
942 sent back to the sender.
943
944 --mf (More Fragments)
945 Sets the More Fragments bit in sent packets. The MF flag is set to
946 indicate the receiver that the current datagram is a fragment of
947 some larger datagram. When set to zero it indicates that the
948 current datagram is either the last fragment in the set or that it
949 is the only fragment.
950
951 --evil (Reserved / Evil)
952 Sets the Reserved / Evil bit in sent packets. The Evil flag helps
953 firewalls and other network security systems to distinguish between
954 datagrams that have malicious intent and those that are merely
955 unusual. When set, it indicates that the datagram has evil intent,
956 instructing insecure systems to succumb. Setting it to zero
957 indicates no evil intent. The option is implied if environmental
958 variable SCRIPT_KIDDIE is set to a non-zero value.
959
960 --ttl hops (Time To Live)
961 Sets the IPv4 Time-To-Live (TTL) field in sent packets to the given
962 value. The TTL field specifies how long the datagram is allowed to
963 exist on the network. It was originally intended to represent a
964 number of seconds but it actually represents the number of hops a
965 packet can traverse before being dropped. The TTL tries to avoid a
966 situation in which undeliverable datagrams keep being forwarded
967 from one router to another endlessly. hops must be a number in the
968 range [0–255].
969
970 --badsum-ip (Invalid IP checksum)
971 Asks Nping to use an invalid IP checksum for packets sent to target
972 hosts. Note that some systems (like most Linux kernels), may fix
973 the checksum before placing the packet on the wire, so even if
974 Nping shows the incorrect checksum in its output, the packets may
975 be transparently corrected by the kernel.
976
977 --ip-options S|R [route]|L [route]|T|U ..., --ip-options hex string (IP
978 Options)
979 The IP protocol offers several options which may be placed in
980 packet headers. Unlike the ubiquitous TCP options, IP options are
981 rarely seen due to practicality and security concerns. In fact,
982 many Internet routers block the most dangerous options such as
983 source routing. Yet options can still be useful in some cases for
984 determining and manipulating the network route to target machines.
985 For example, you may be able to use the record route option to
986 determine a path to a target even when more traditional
987 traceroute-style approaches fail. Or if your packets are being
988 dropped by a certain firewall, you may be able to specify a
989 different route with the strict or loose source routing options.
990
991 The most powerful way to specify IP options is to simply pass in
992 hexadecimal data as the argument to --ip-options. Precede each hex
993 byte value with \x. You may repeat certain characters by following
994 them with an asterisk and then the number of times you wish them to
995 repeat. For example, \x01\x07\x04\x00*4 is the same as
996 \x01\x07\x04\x00\x00\x00\x00.
997
998 Note that if you specify a number of bytes that is not a multiple
999 of four, an incorrect IP header length will be set in the IP
1000 packet. The reason for this is that the IP header length field can
1001 only express multiples of four. In those cases, the length is
1002 computed by dividing the header length by 4 and rounding down. This
1003 will affect the way the header that follows the IP header is
1004 interpreted, showing bogus information in Nping or in the output of
1005 any sniffer. Although this kind of situation might be useful for
1006 some stack stress tests, users would normally want to specify
1007 explicit padding, so the correct header length is set.
1008
1009 Nping also offers a shortcut mechanism for specifying options.
1010 Simply pass the letter R, T, or U to request record-route,
1011 record-timestamp, or both options together, respectively. Loose or
1012 strict source routing may be specified with an L or S followed by a
1013 space and then a space-separated list of IP addresses.
1014
1015 For more information and examples of using IP options with Nping,
1016 see the mailing list post at
1017 https://seclists.org/nmap-dev/2006/q3/0052.html.
1018
1019 --mtu size (Maximum Transmission Unit)
1020 This option sets a fictional MTU in Nping so IP datagrams larger
1021 than size are fragmented before transmission. size must be
1022 specified in bytes and corresponds to the number of octets that can
1023 be carried on a single link-layer frame.
1024
1026 -6, --ipv6 (Use IPv6)
1027 Tells Nping to use IP version 6 instead of the default IPv4. It is
1028 generally a good idea to specify this option as early as possible
1029 in the command line so Nping can parse it soon and know in advance
1030 that the rest of the parameters refer to IPv6. The command syntax
1031 is the same as usual except that you also add the -6 option. Of
1032 course, you must use IPv6 syntax if you specify an address rather
1033 than a hostname. An address might look like
1034 3ffe:7501:4819:2000:210:f3ff:fe03:14d0, so hostnames are
1035 recommended.
1036
1037 While IPv6 hasn't exactly taken the world by storm, it gets
1038 significant use in some (usually Asian) countries and most modern
1039 operating systems support it. To use Nping with IPv6, both the
1040 source and target of your packets must be configured for IPv6. If
1041 your ISP (like most of them) does not allocate IPv6 addresses to
1042 you, free tunnel brokers are widely available and work fine with
1043 Nping. You can use the free IPv6 tunnel broker service at
1044 http://www.tunnelbroker.net.
1045
1046 Please note that IPv6 support is still highly experimental and many
1047 modes and options may not work with it.
1048
1049 -S addr, --source-ip addr (Source IP Address)
1050 Sets the source IP address. This option lets you specify a custom
1051 IP address to be used as source IP address in sent packets. This
1052 allows spoofing the sender of the packets. addr can be an IPv6
1053 address or a hostname.
1054
1055 --dest-ip addr (Destination IP Address)
1056 Adds a target to Nping's target list. This option is provided for
1057 consistency but its use is deprecated in favor of plain target
1058 specifications. See the section called “TARGET SPECIFICATION”.
1059
1060 --flow label (Flow Label)
1061 Sets the IPv6 Flow Label. The Flow Label field is 20 bits long and
1062 is intended to provide certain quality-of-service properties for
1063 real-time datagram delivery. However, it has not been widely
1064 adopted, and not all routers or endpoints support it. Check RFC
1065 2460 for more information. label must be an integer in the range
1066 [0–1048575].
1067
1068 --traffic-class class (Traffic Class)
1069 Sets the IPv6 Traffic Class. This field is similar to the TOS field
1070 in IPv4, and is intended to provide the Differentiated Services
1071 method, enabling scalable service discrimination in the Internet
1072 without the need for per-flow state and signaling at every hop.
1073 Check RFC 2474 for more information. class must be an integer in
1074 the range [0–255].
1075
1076 --hop-limit hops (Hop Limit)
1077
1078 Sets the IPv6 Hop Limit field in sent packets to the given value.
1079 The Hop Limit field specifies how long the datagram is allowed to
1080 exist on the network. It represents the number of hops a packet can
1081 traverse before being dropped. As with the TTL in IPv4, IPv6 Hop
1082 Limit tries to avoid a situation in which undeliverable datagrams
1083 keep being forwarded from one router to another endlessly. hops
1084 must be a number in the range [0–255].
1085
1087 In most cases Nping sends packets at the raw IP level. This means that
1088 Nping creates its own IP packets and transmits them through a raw
1089 socket. However, in some cases it may be necessary to send packets at
1090 the raw Ethernet level. This happens, for example, when Nping is run
1091 under Windows (as Microsoft has disabled raw socket support since
1092 Windows XP SP2), or when Nping is asked to send ARP packets. Since in
1093 some cases it is necessary to construct ethernet frames, Nping offers
1094 some options to manipulate the different fields.
1095
1096 --dest-mac mac (Ethernet Destination MAC Address)
1097 This option sets the destination MAC address that should be set in
1098 outgoing Ethernet frames. This is useful in case Nping can't
1099 determine the next hop's MAC address or when you want to route
1100 probes through a router other than the configured default gateway.
1101 The MAC address should have the usual format of six colon-separated
1102 bytes, e.g. 00:50:56:d4:01:98. Alternatively, hyphens may be used
1103 instead of colons. Use the word random or rand to generate a random
1104 address, and broadcast or bcast to use ff:ff:ff:ff:ff:ff. If you
1105 set up a bogus destination MAC address your probes may not reach
1106 the intended targets.
1107
1108 --source-mac mac (Ethernet Source MAC Address)
1109 This option sets the source MAC address that should be set in
1110 outgoing Ethernet frames. This is useful in case Nping can't
1111 determine your network interface MAC address or when you want to
1112 inject traffic into the network while hiding your network card's
1113 real address. The syntax is the same as for --dest-mac. If you set
1114 up a bogus source MAC address you may not receive probe replies.
1115
1116 --ether-type type (Ethertype)
1117 This option sets the Ethertype field of the ethernet frame. The
1118 Ethertype is used to indicate which protocol is encapsulated in the
1119 payload. type can be supplied in two different ways. You can use
1120 the official numbers listed by the IEEE[3] (e.g. --ether-type
1121 0x0800 for IP version 4), or one of the mnemonics from the section
1122 called “Ethernet Types”.
1123
1124 Ethernet Types
1125 These identifiers may be used as mnemonics for the Ethertype numbers
1126 given to the --arp-type option.
1127
1128 ipv4, ip, 4
1129 Internet Protocol version 4 (type 0x0800).
1130
1131 ipv6, 6
1132 Internet Protocol version 6 (type 0x86DD).
1133
1134 arp
1135 Address Resolution Protocol (type 0x0806).
1136
1137 rarp
1138 Reverse Address Resolution Protocol (type 0x8035).
1139
1140 frame-relay, frelay, fr
1141 Frame Relay (type 0x0808).
1142
1143 ppp
1144 Point-to-Point Protocol (type 0x880B).
1145
1146 gsmp
1147 General Switch Management Protocol (type 0x880C).
1148
1149 mpls
1150 Multiprotocol Label Switching (type 0x8847).
1151
1152 mps-ual, mps
1153 Multiprotocol Label Switching with Upstream-assigned Label (type
1154 0x8848).
1155
1156 mcap
1157 Multicast Channel Allocation Protocol (type 0x8861).
1158
1159 pppoe-discovery, pppoe-d
1160 PPP over Ethernet Discovery Stage (type 0x8863).
1161
1162 pppoe-session, pppoe-s
1163 PPP over Ethernet Session Stage (type 0x8864).
1164
1165 ctag
1166 Customer VLAN Tag Type (type 0x8100).
1167
1168 epon
1169 Ethernet Passive Optical Network (type 0x8808).
1170
1171 pbnac
1172 Port-based network access control (type 0x888E).
1173
1174 stag
1175 Service VLAN tag identifier (type 0x88A8).
1176
1177 ethexp1
1178 Local Experimental Ethertype 1 (type 0x88B5).
1179
1180 ethexp2
1181 Local Experimental Ethertype 2 (type 0x88B6).
1182
1183 ethoui
1184 OUI Extended Ethertype (type 0x88B7).
1185
1186 preauth
1187 Pre-Authentication (type 0x88C7).
1188
1189 lldp
1190 Link Layer Discovery Protocol (type 0x88CC).
1191
1192 mac-security, mac-sec, macsec
1193 Media Access Control Security (type 0x88E5).
1194
1195 mvrp
1196 Multiple VLAN Registration Protocol (type 0x88F5).
1197
1198 mmrp
1199 Multiple Multicast Registration Protocol (type 0x88F6).
1200
1201 frrr
1202 Fast Roaming Remote Request (type 0x890D).
1203
1205 --data hex string (Append custom binary data to sent packets)
1206 This option lets you include binary data as payload in sent
1207 packets. hex string may be specified in any of the following
1208 formats: 0xAABBCCDDEEFF..., AABBCCDDEEFF... or
1209 \xAA\xBB\xCC\xDD\xEE\xFF.... Examples of use are --data 0xdeadbeef
1210 and --data \xCA\xFE\x09. Note that if you specify a number like
1211 0x00ff no byte-order conversion is performed. Make sure you specify
1212 the information in the byte order expected by the receiver.
1213
1214 --data-string string (Append custom string to sent packets)
1215 This option lets you include a regular string as payload in sent
1216 packets. string can contain any string. However, note that some
1217 characters may depend on your system's locale and the receiver may
1218 not see the same information. Also, make sure you enclose the
1219 string in double quotes and escape any special characters from the
1220 shell. Example: --data-string "Jimmy Jazz...".
1221
1222 --data-length len (Append random data to sent packets)
1223 This option lets you include len random bytes of data as payload in
1224 sent packets. len must be an integer in the range [0–65400].
1225 However, values higher than 1400 are not recommended because it may
1226 not be possible to transmit packets due to network MTU limitations.
1227
1229 The "Echo Mode" is a novel technique implemented by Nping which lets
1230 users see how network packets change in transit, from the host where
1231 they originated to the target machine. Basically, the Echo mode turns
1232 Nping into two different pieces: the Echo server and the Echo client.
1233 The Echo server is a network service that has the ability to capture
1234 packets from the network and send a copy ("echo them") to the
1235 originating client through a side TCP channel. The Echo client is the
1236 part that generates such network packets, transmits them to the server,
1237 and receives their echoed version through a side TCP channel that it
1238 has previously established with the Echo server.
1239
1240 This scheme lets the client see the differences between the packets
1241 that it sends and what is actually received by the server. By having
1242 the server send back copies of the received packets through the side
1243 channel, things like NAT devices become immediately apparent to the
1244 client because it notices the changes in the source IP address (and
1245 maybe even source port). Other devices like those that perform traffic
1246 shaping, changing TCP window sizes or adding TCP options transparently
1247 between hosts, turn up too.
1248
1249 The Echo mode is also useful for troubleshooting routing and firewall
1250 issues. Among other things, it can be used to determine if the traffic
1251 generated by the Nping client is being dropped in transit and never
1252 gets to its destination or if the responses are the ones that don't get
1253 back to it.
1254
1255 Internally, client and server communicate over an encrypted and
1256 authenticated channel, using the Nping Echo Protocol (NEP), whose
1257 technical specification can be found in
1258 https://nmap.org/svn/nping/docs/EchoProtoRFC.txt
1259
1260 The following paragraphs describe the different options available in
1261 Nping's Echo mode.
1262
1263 --ec passphrase, --echo-client passphrase (Run Echo client)
1264 This option tells Nping to run as an Echo client. passphrase is a
1265 sequence of ASCII characters that is used used to generate the
1266 cryptographic keys needed for encryption and authentication in a
1267 given session. The passphrase should be a secret that is also known
1268 by the server, and it may contain any number of printable ASCII
1269 characters. Passphrases that contain whitespace or special
1270 characters must be enclosed in double quotes.
1271
1272 When running Nping as an Echo client, most options from the regular
1273 raw probe modes apply. The client may be configured to send
1274 specific probes using flags like --tcp, --icmp or --udp. Protocol
1275 header fields may be manipulated normally using the appropriate
1276 options (e.g. --ttl, --seq, --icmp-type, etc.). The only
1277 exceptions are ARP-related flags, which are not supported in Echo
1278 mode, as protocols like ARP are closely related to the data link
1279 layer and its probes can't pass through different network segments.
1280
1281 --es passphrase, --echo-server passphrase (Run Echo server)
1282 This option tells Nping to run as an Echo server. passphrase is a
1283 sequence of ASCII characters that is used used to generate the
1284 cryptographic keys needed for encryption and authentication in a
1285 given session. The passphrase should be a secret that is also known
1286 by the clients, and it may contain any number of printable ASCII
1287 characters. Passphrases that contain whitespace or special
1288 characters must be enclosed in double quotes. Note that although it
1289 is not recommended, it is possible to use empty passphrases,
1290 supplying --echo-server "". However, if what you want is to set up
1291 an open Echo server, it is better to use option --no-crypto. See
1292 below for details.
1293
1294 --ep port, --echo-port port (Set Echo TCP port number)
1295 This option asks Nping to use the specified TCP port number for the
1296 Echo side channel connection. If this option is used with
1297 --echo-server, it specifies the port on which the server listens
1298 for connections. If it is used with --echo-client, it specifies the
1299 port to connect to on the remote host. By default, port number 9929
1300 is used.
1301
1302 --nc, --no-crypto (Disable encryption and authentication)
1303 This option asks Nping not to use any cryptographic operations
1304 during an Echo session. In practical terms, this means that the
1305 Echo side channel session data will be transmitted in the clear,
1306 and no authentication will be performed by the server or client
1307 during the session establishment phase. When --no-crypto is used,
1308 the passphrase supplied with --echo-server or --echo-client is
1309 ignored.
1310
1311 This option must be specified if Nping was compiled without openSSL
1312 support. Note that, for technical reasons, a passphrase still needs
1313 to be supplied after the --echo-client or --echo-server flags, even
1314 though it will be ignored.
1315
1316 The --no-crypto flag might be useful when setting up a public Echo
1317 server, because it allows users to connect to the Echo server
1318 without the need for any passphrase or shared secret. However, it
1319 is strongly recommended to not use --no-crypto unless absolutely
1320 necessary. Public Echo servers should be configured to use the
1321 passphrase "public" or the empty passphrase (--echo-server "") as
1322 the use of cryptography does not only provide confidentiality and
1323 authentication but also message integrity.
1324
1325 --once (Serve one client and quit)
1326 This option asks the Echo server to quit after serving one client.
1327 This is useful when only a single Echo session wants to be
1328 established as it eliminates the need to access the remote host to
1329 shutdown the server.
1330
1331 --safe-payloads (Zero application data before echoing a packet)
1332 This option asks the Echo server to erase any application layer
1333 data found in client packets before echoing them. When the option
1334 is enabled, the Echo server parses the packets received from Echo
1335 clients and tries to determine if they contain data beyond the
1336 transport layer. If such data is found, it is overwritten with
1337 zeroes before transmitting the packets to the appropriate Echo
1338 client.
1339
1340 Echo servers can handle multiple simultaneous clients running
1341 multiple echo sessions in parallel. In order to determine which
1342 packet needs to be echoed to which client and through which
1343 session, the Echo server uses an heuristic algorithm. Although we
1344 have taken every security measure that we could think of to prevent
1345 that a client receives an echoed packet that it did not generate,
1346 there is always a risk that our algorithm makes a mistake and
1347 delivers a packet to the wrong client. The --safe-payloads option
1348 is useful for public echo servers or critical deployments where
1349 that kind of mistake cannot be afforded.
1350
1351 The following examples illustrate how Nping's Echo mode can be used to
1352 discover intermediate devices.
1353
1354 Example 2. Discovering NAT devices
1355
1356 # nping --echo-client "public" echo.nmap.org --udp
1357
1358 Starting Nping ( https://nmap.org/nping )
1359 SENT (1.0970s) UDP 10.1.20.128:53 > 178.79.165.17:40125 ttl=64 id=32523 iplen=28
1360 CAPT (1.1270s) UDP 80.38.10.21:45657 > 178.79.165.17:40125 ttl=54 id=32523 iplen=28
1361 RCVD (1.1570s) ICMP 178.79.165.17 > 10.1.20.128 Port unreachable (type=3/code=3) ttl=49 id=16619 iplen=56
1362 [...]
1363 SENT (5.1020s) UDP 10.1.20.128:53 > 178.79.165.17:40125 ttl=64 id=32523 iplen=28
1364 CAPT (5.1335s) UDP 80.38.10.21:45657 > 178.79.165.17:40125 ttl=54 id=32523 iplen=28
1365 RCVD (5.1600s) ICMP 178.79.165.17 > 10.1.20.128 Port unreachable (type=3/code=3) ttl=49 id=16623 iplen=56
1366
1367 Max rtt: 60.628ms | Min rtt: 58.378ms | Avg rtt: 59.389ms
1368 Raw packets sent: 5 (140B) | Rcvd: 5 (280B) | Lost: 0 (0.00%)| Echoed: 5 (140B)
1369 Tx time: 4.00459s | Tx bytes/s: 34.96 | Tx pkts/s: 1.25
1370 Rx time: 5.00629s | Rx bytes/s: 55.93 | Rx pkts/s: 1.00
1371 Nping done: 1 IP address pinged in 6.18 seconds
1372
1373
1374 The output clearly shows the presence of a NAT device in the client's
1375 local network. Note how the captured packet (CAPT) differs from the
1376 SENT packet: the source address for the original packets is in the
1377 reserved 10.0.0.0/8 range, while the address seen by the server is
1378 80.38.10.21, the Internet side address of the NAT device. The source
1379 port was also modified by the device. The line starting with RCVD
1380 corresponds to the responses generated by the TCP/IP stack of the
1381 machine where the Echo server is run.
1382
1383 Example 3. Discovering a transparent proxy
1384
1385 # nping --echo-client "public" echo.nmap.org --tcp -p80
1386
1387 Starting Nping ( https://nmap.org/nping )
1388 SENT (1.2160s) TCP 10.0.1.77:41659 > 178.79.165.17:80 S ttl=64 id=3317 iplen=40 seq=567704200 win=1480
1389 RCVD (1.2180s) TCP 178.79.165.17:80 > 10.0.1.77:41659 SA ttl=128 id=13177 iplen=44 seq=3647106954 win=16384 <mss 1460>
1390 SENT (2.2150s) TCP 10.0.1.77:41659 > 178.79.165.17:80 S ttl=64 id=3317 iplen=40 seq=567704200 win=1480
1391 SENT (3.2180s) TCP 10.0.1.77:41659 > 178.79.165.17:80 S ttl=64 id=3317 iplen=40 seq=567704200 win=1480
1392 SENT (4.2190s) TCP 10.0.1.77:41659 > 178.79.165.17:80 S ttl=64 id=3317 iplen=40 seq=567704200 win=1480
1393 SENT (5.2200s) TCP 10.0.1.77:41659 > 178.79.165.17:80 S ttl=64 id=3317 iplen=40 seq=567704200 win=1480
1394
1395 Max rtt: 2.062ms | Min rtt: 2.062ms | Avg rtt: 2.062ms
1396 Raw packets sent: 5 (200B) | Rcvd: 1 (46B) | Lost: 4 (80.00%)| Echoed: 0 (0B)
1397 Tx time: 4.00504s | Tx bytes/s: 49.94 | Tx pkts/s: 1.25
1398 Rx time: 5.00618s | Rx bytes/s: 9.19 | Rx pkts/s: 0.20
1399 Nping done: 1 IP address pinged in 6.39 seconds
1400
1401
1402 In this example, the output is a bit more tricky. The absence of error
1403 messages shows that the Echo client has successfully established an
1404 Echo session with the server. However, no CAPT packets can be seen in
1405 the output. This means that none of the transmitted packets reached the
1406 server. Interestingly, a TCP SYN-ACK packet was received in response to
1407 the first TCP-SYN packet (and also, it is known that the target host
1408 does not have port 80 open). This behavior reveals the presence of a
1409 transparent web proxy cache server (which in this case is an old MS ISA
1410 server).
1411
1413 --delay time (Delay between probes)
1414 This option lets you control for how long will Nping wait before
1415 sending the next probe. Like in many other ping tools, the default
1416 delay is one second. time must be a positive integer or floating
1417 point number. By default it is specified in seconds, however you
1418 can give an explicit unit by appending ms for milliseconds, s for
1419 seconds, m for minutes, or h for hours (e.g. 2.5s, 45m, 2h).
1420
1421 --rate rate (Send probes at a given rate)
1422 This option specifies the number of probes that Nping should send
1423 per second. This option and --delay are inverses; --rate 20 is the
1424 same as --delay 0.05. If both options are used, only the last one
1425 in the parameter list counts.
1426
1428 -h, --help (Display help)
1429 Displays help information and exits.
1430
1431 -V, --version (Display version)
1432 Displays the program's version number and quits.
1433
1434 -c rounds, --count rounds (Stop after a given number of rounds)
1435 This option lets you specify the number of times that Nping should
1436 loop over target hosts (and in some cases target ports). Nping
1437 calls these “rounds”. In a basic execution with only one target
1438 (and only one target port in TCP/UDP modes), the number of rounds
1439 matches the number of probes sent to the target host. However, in
1440 more complex executions where Nping is run against multiple targets
1441 and multiple ports, the number of rounds is the number of times
1442 that Nping sends a complete set of probes that covers all target
1443 IPs and all target ports. For example, if Nping is asked to send
1444 TCP SYN packets to hosts 192.168.1.0-255 and ports 80 and 433, then
1445 256 × 2 = 512 packets are sent in one round. So if you specify -c
1446 100, Nping will loop over the different target hosts and ports 100
1447 times, sending a total of 256 × 2 × 100 = 51200 packets. By default
1448 Nping runs for 5 rounds. If a value of 0 is specified, Nping will
1449 run continuously.
1450
1451 -e name, --interface name (Set the network interface to be used)
1452 This option tells Nping what interface should be used to send and
1453 receive packets. Nping should be able to detect this automatically,
1454 but it will tell you if it cannot. name must be the name of an
1455 existing network interface with an assigned IP address.
1456
1457 --privileged (Assume that the user is fully privileged)
1458 Tells Nping to simply assume that it is privileged enough to
1459 perform raw socket sends, packet sniffing, and similar operations
1460 that usually require special privileges. By default Nping quits if
1461 such operations are requested by a user that has no root or
1462 administrator privileges. This option may be useful on Linux, BSD
1463 or similar systems that can be configured to allow unprivileged
1464 users to perform raw-packet transmissions. The NPING_PRIVILEGED
1465 environment variable may be set as an alternative to using
1466 --privileged.
1467
1468 --unprivileged (Assume that the user lacks raw socket privileges)
1469 This option is the opposite of --privileged. It tells Nping to
1470 treat the user as lacking network raw socket and sniffing
1471 privileges. This is useful for testing, debugging, or when the raw
1472 network functionality of your operating system is somehow broken.
1473 The NPING_UNPRIVILEGED environment variable may be set as an
1474 alternative to using --unprivileged.
1475
1476 --send-eth (Use raw ethernet sending)
1477 Asks Nping to send packets at the raw ethernet (data link) layer
1478 rather than the higher IP (network) layer. By default, Nping
1479 chooses the one which is generally best for the platform it is
1480 running on. Raw sockets (IP layer) are generally most efficient for
1481 Unix machines, while ethernet frames are required for Windows
1482 operation since Microsoft disabled raw socket support. Nping still
1483 uses raw IP packets despite this option when there is no other
1484 choice (such as non-ethernet connections).
1485
1486 --send-ip (Send at raw IP level)
1487 Asks Nping to send packets via raw IP sockets rather than sending
1488 lower level ethernet frames. It is the complement to the --send-eth
1489 option.
1490
1491 --bpf-filter filter spec --filter filter spec (Set custom BPF filter)
1492 This option lets you use a custom BPF filter. By default Nping
1493 chooses a filter that is intended to capture most common responses
1494 to the particular probes that are sent. For example, when sending
1495 TCP packets, the filter is set to capture packets whose destination
1496 port matches the probe's source port or ICMP error messages that
1497 may be generated by the target or any intermediate device as a
1498 result of the probe. If for some reason you expect strange packets
1499 in response to sent probes or you just want to sniff a particular
1500 kind of traffic, you can specify a custom filter using the BPF
1501 syntax used by tools like tcpdump. See the documentation at
1502 http://www.tcpdump.org/ for more information.
1503
1504 -H, --hide-sent (Do not display sent packets)
1505 This option tells Nping not to print information about sent
1506 packets. This can be useful when using very short inter-probe
1507 delays (i.e., when flooding), because printing information to the
1508 standard output has a computational cost and disabling it can
1509 probably speed things up a bit. Also, it may be useful when using
1510 Nping to detect active hosts or open ports (e.g. sending probes to
1511 all TCP ports in a /24 subnet). In that case, users may not want to
1512 see thousands of sent probes but just the replies generated by
1513 active hosts.
1514
1515 -N, --no-capture (Do not attempt to capture replies)
1516 This option tells Nping to skip packet capture. This means that
1517 packets in response to sent probes will not be processed or
1518 displayed. This can be useful when doing flooding and network stack
1519 stress tests. Note that when this option is specified, most of the
1520 statistics shown at the end of the execution will be useless. This
1521 option does not work with TCP Connect mode.
1522
1524 -v[level], --verbose [level] (Increase or set verbosity level)
1525 Increases the verbosity level, causing Nping to print more
1526 information during its execution. There are 9 levels of verbosity
1527 (-4 to 4). Every instance of -v increments the verbosity level by
1528 one (from its default value, level 0). Every instance of option -q
1529 decrements the verbosity level by one. Alternatively you can
1530 specify the level directly, as in -v3 or -v-1. These are the
1531 available levels:
1532
1533 Level -4
1534 No output at all. In some circumstances you may not want Nping
1535 to produce any output (like when one of your work mates is
1536 watching over your shoulder). In that case level -4 can be
1537 useful because although you won't see any response packets,
1538 probes will still be sent.
1539
1540 Level -3
1541 Like level -4 but displays fatal error messages so you can
1542 actually see if Nping is running or it failed due to some
1543 error.
1544
1545 Level -2
1546 Like level -3 but also displays warnings and recoverable
1547 errors.
1548
1549 Level -1
1550 Displays traditional run-time information (version, start time,
1551 statistics, etc.) but does not display sent or received
1552 packets.
1553
1554 Level 0
1555 This is the default verbosity level. It behaves like level -1
1556 but also displays sent and received packets and some other
1557 important information.
1558
1559 Level 1
1560 Like level 0 but it displays detailed information about timing,
1561 flags, protocol details, etc.
1562
1563 Level 2
1564 Like level 1 but displays very detailed information about sent
1565 and received packets and other interesting information.
1566
1567 Level 3
1568 Like level 2 but also displays the raw hexadecimal dump of sent
1569 and received packets.
1570
1571 Level 4 and higher
1572 Same as level 3.
1573
1574 -q[level], --reduce-verbosity [level] (Decrease verbosity level)
1575 Decreases the verbosity level, causing Nping to print less
1576 information during its execution.
1577
1578 -d[level] (Increase or set debugging level)
1579 When even verbose mode doesn't provide sufficient data for you,
1580 debugging is available to flood you with much more! As with the -v,
1581 debugging is enabled with a command-line flag -d and the debug
1582 level can be increased by specifying it multiple times. There are 7
1583 debugging levels (0 to 6). Every instance of -d increments
1584 debugging level by one. Provide an argument to -d to set the level
1585 directly; for example -d4.
1586
1587 Debugging output is useful when you suspect a bug in Nping, or if
1588 you are simply confused as to what Nping is doing and why. As this
1589 feature is mostly intended for developers, debug lines aren't
1590 always self-explanatory. You may get something like
1591
1592
1593 NSOCK (1.0000s) Callback: TIMER SUCCESS for EID 12; tcpconnect_event_handler(): Received callback of type TIMER with status SUCCESS
1594
1595 If you don't understand a line, your only recourses are to ignore
1596 it, look it up in the source code, or request help from the
1597 development list (nmap-dev). Some lines are self-explanatory, but
1598 the messages become more obscure as the debug level is increased.
1599 These are the available levels:
1600
1601 Level 0
1602 Level 0. No debug information at all. This is the default
1603 level.
1604
1605 Level 1
1606 In this level, only very important or high-level debug
1607 information will be printed.
1608
1609 Level 2
1610 Like level 1 but also displays important or medium-level debug
1611 information
1612
1613 Level 3
1614 Like level 2 but also displays regular and low-level debug
1615 information.
1616
1617 Level 4
1618 Like level 3 but also displays messages only a real Nping freak
1619 would want to see.
1620
1621 Level 5
1622 Like level 4 but it enables basic debug information related to
1623 external libraries like Nsock.
1624
1625 Level 6
1626 Like level 5 but it enables full, very detailed, debug
1627 information related to external libraries like Nsock.
1628
1630 Like its authors, Nping isn't perfect. But you can help make it better
1631 by sending bug reports or even writing patches. If Nping doesn't behave
1632 the way you expect, first upgrade to the latest version available from
1633 https://nmap.org. If the problem persists, do some research to
1634 determine whether it has already been discovered and addressed. Try
1635 searching for the problem or error message on Google since that
1636 aggregates so many forums. If nothing comes of this, create an Issue on
1637 our tracker (http://issues.nmap.org) and/or mail a bug report to
1638 <dev@nmap.org>. If you subscribe to the nmap-dev list before posting,
1639 your message will bypass moderation and get through more quickly.
1640 Subscribe at https://nmap.org/mailman/listinfo/dev. Please include
1641 everything you have learned about the problem, as well as what version
1642 of Nping you are using and what operating system version it is running
1643 on. Other suggestions for improving Nping may be sent to the Nmap dev
1644 mailing list as well.
1645
1646 If you are able to write a patch improving Nping or fixing a bug, that
1647 is even better! Instructions for submitting patches or git pull
1648 requests are available from
1649 https://github.com/nmap/nmap/blob/master/CONTRIBUTING.md
1650
1651 Particularly sensitive issues such as a security reports may be sent
1652 directly to Fyodor directly at <fyodor@nmap.org>. All other reports and
1653 comments should use the dev list or issue tracker instead because more
1654 people read, follow, and respond to those.
1655
1657 Luis MartinGarcia <luis.mgarc@gmail.com> (http://www.luismg.com)
1658
1659 Fyodor <fyodor@nmap.org> (https://insecure.org)
1660
1662 1. official type numbers assigned by IANA
1663 http://www.iana.org/assignments/icmp-parameters
1664
1665 2. official numbers assigned by IANA
1666 http://www.iana.org/assignments/arp-parameters/
1667
1668 3. official numbers listed by the IEEE
1669 http://standards.ieee.org/regauth/ethertype/eth.txt
1670
1671
1672
1673Nping 08/31/2022 NPING(1)