Ping sweep
In computing, a ping sweep is a method that can establish a range of IP addresses which map to live hosts.
The classic tool used for ping sweeps is Template:Not a typo,[1][2][3] which traditionally was accompanied by Template:Not a typo to generate the list of hosts for large subnets,[4] although more recent versions of Template:Not a typo include that functionality.[1] Well-known tools with ping sweep capability include nmap for Unix and Windows systems, and the Pinger software from Rhino9 for Windows NT.[4][5] There are many other tools with this capability, including:[2][5] Hping, IEA's aping, Simple Nomad's ICMPEnum, SolarWind's Ping Sweep, and Foundstone's SuperScan. There is also a ping sweep tool for Windows, Mac, Linux, Android, and iOS called Fing made by Overlook Soft.
Pings can be detected by protocol loggers like Template:Not a typo.[3]
References
<templatestyles src="Reflist/styles.css" />
- ↑ a b Mike Shema, Chris Davis, Anti-hacker tool kit, Edition 3, McGraw Hill Professional, 2006, Template:ISBN, pp. 403–406
- ↑ a b Stuart McClure, Joel Scambray, George Kurtz, Hacking Exposed: Network Security Secrets & Solutions, Edition 6, McGraw Hill Professional, 2009, Template:ISBN, pp. 44–51
- ↑ a b Teo, Lawrence (December, 2000). Network Probes Explained: Understanding Port Scans and Ping Sweeps, Linux Journal
- ↑ a b Stuart McClure and Joel Scambray, An arsenal of attack tools is an essential part of any strong security defense, InfoWorld, Jul 24, 2000, Vol. 22, No. 30, ISSN 0199-6649, p. 59
- ↑ a b Susan Elizabeth Young, Dave Aitel, The hacker's handbook: the strategy behind breaking into and defending Networks, CRC Press, 2004, Template:ISBN, p. 75
Script error: No such module "Check for unknown parameters".