April 16, 2010
April 09, 2010
April 07, 2010
April 04, 2010
F ping
Fast pinger, version 2.09
(c) Copyright 2001 - 2002 Kwakkelflap
Written by Wouter Dhondt
Web: http://www.kwakkelflap.com
E-Mail: info@kwakkelflap.com
---------------------------------------------------------------------------------
Fping is a simple ping program, intended to be used instead of the
standard ping program that comes with windows. It was first made
to ping faster than once every second. Options have been added since
then and fping is now a very handy tool (at least I think it is).
PLATFORMS:
Windows 95, 98, NT 4.0, 2000, ME and XP
---------------------------------------------------------------------------------
Ping is one of the most useful network debugging tools available. The first ping
program was written by Mike Muuss in December 1983 for use on Unix machines. Muuss
named his program after the sonar sounds used for echolocation by submarines,
although some say ping stands for "Packet InterNet Grouper". Ping sends a small
packet of information containing an ICMP ECHO_REQUEST to a specified computer,
which then sends an ECHO_REPLY packet in return. The ping program then evaluates
this reply, and a report is shown. You can check several things with the ping
program: can you reach another computer, how long does it take to bounce a packet
off of another site, ... You can ping either a domain name, or an IP address.
Functionality to show domain names when using IP addresses is supported. Even
routing options are available, alas only 9 routes can be shown due to the
structure of the IP header (RFC 792). Why did I write my own ping program?
There are two main reasons: a) It wanted to know how the ping program worked. I
found it really intriguing and was very curious and b) There was a need for a
better ping program here at the lab where I work.
Usage:
fping [-s data_size] [-S size1/size2] [-c] [-t time] [-w timeout]
[-n count] [-h TTL] [-v TOS] [-r routes] [-a] [-f] [-b(-)] [-i]
[-l] [-T] [-d ping_data] [-H filename]
Options:
-s : data_size in bytes up to 65500
-S : size sweep. Ping with size1, size1 + 1, ..., size 2 datalength
-c : continuous ping (higher priority than -n)
to see statistics and continue - type Control-Break;
to stop - type Control-C.
-t : time between 2 pings in ms up to 5000
-w : timeout in ms to wait for each reply
-n : number of echo requests to send
-h : number of hops (TTL: 1 to 128)
-v : Type Of Service (0 to 255)
-r : record route (1 to 9 routes)
-a : resolve addresses to hostnames
-f : set Don't Fragment flag in packet
-b : beep on every successful reply (- to beep on timeout)
-i : use ICMP dll instead of raw socket (disables -r)
-l : limit the output to ping results and errors
-T : print timestamp with each reply
-d : ping with specified data
-H : get hosts from filename (comma delimited, filename with full path)
fping uses raw sockets. This can be a problem for NT / 2000 system
users without administrator rights. Raw socket creation will fail
due to a silly and useless socket protection. Fping will switch
to the ICMP dll if this happens (to ping the micro$oft way). To
disable this protection (and take full advantage of fping) you can
do the following:
a) NT4 users should change / add the following registry variable
and set its value to DWORD 1:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Afd\Parameters\DisableRawSecurity
b) 2000 users should set the following registry variable to DWORD 1
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\AllowUserRawAccess
after you change the registry, you will need to reboot.
You can also run the reg file in accordance with your os.
Return Values:
Reply: 0
Reply timed out: 1
Host not found: 2
Packet size exceeds MTU: 3
Too few bytes: 4
Non-echo type: 5
Send questions (and bug reports) 2 support@kwakkelflap.com
---------------------------------------------------------------------------------
Legal mumbo jumbo :
This program and the accompanying documentation are Copyright (C) 2001 - 2002
by Kwakkelflap. You are allowed to redistribute it, provided that all
the files in the original archive are distributed together and no changes
are made to any file in the distribution. You can't charge for the
program, only for distributing it. You have to clearly identify me
(Wouter Dhondt) as the author.
This program comes without any warranty either implied or expressed. In no
case shall the author be liable for any damage or unwanted behaviour of any
computer hardware and/or software.
The same things in English:
- I own it. It's mine. Muahahaha! (But I let you use it too.)
- I can't guarantee that it works, or that it works correctly.
- If it breaks, it's your fault. But you do get to keep the pieces.
- If it breaks something else, it's your fault too.
- If you copy it, don't claim that you've made it yourself, or
change it in any way; and copy both program and documentation.
- You are free to offer the program on your web page. All I ask for
is that you give a link back to mine, and that you state that the
program was made by Wouter Dhondt.
---------------------------------------------------------------------------------
Known bugs: none
Possible future enhancements:
- loose and strict route ping options
- enable ICMP route options
- other ping options
---------------------------------------------------------------------------------
Revision History:
Version 2.09 (25/11/02)
- Bug fix: # of bytes with raw socket ping was incorrect
Version 2.08 (07/11/02)
- Fping size sweep
- Ping with specified data
- Retrieve hosts from comma delimited filename
- Removed self made linked list and using STL
Version 2.07 (25/06/02)
- Fping crashed in ICMP ping if no host was found with IP address
- Continue ping if host can't be found from IP address
- Space between return trip time and "ms" to allow better parsing
- Option to print timestamp with each reply
Version 2.06 (12/03/02)
- limit output option
- return values
Version 2.05 (16/10/01)
- ICMP WSAStartup & WSACleanup bug resolved.
- RAW Socket receive error time is now correct
- Usage programdir truncated
- Better invalid option parsing support
- Cleaned IP options struct (number of echo requests)
- Ping multiple hosts
- Reverse beep option
Version 2.04 (29/08/01)
- Zero ping statistics bug resolved
- ICMP dll option
- switch to ICMP dll if raw socket creation failed
- /? | -? gives usage info
- resolving addresses to hostnames (includes routing)
- internal IP options struct changed
- Don't Fragment flag can be set
- Option to beep on every successful reply
Version 2.03 (04/07/01)
- Routing
Version 2.02 (03/07/01)
- Generic error log messages instead of numbers as 10065
- Adjustable # of hops (TTL)
- Adjustable TOS
(c) Copyright 2001 - 2002 Kwakkelflap
Written by Wouter Dhondt
Web: http://www.kwakkelflap.com
E-Mail: info@kwakkelflap.com
---------------------------------------------------------------------------------
Fping is a simple ping program, intended to be used instead of the
standard ping program that comes with windows. It was first made
to ping faster than once every second. Options have been added since
then and fping is now a very handy tool (at least I think it is).
PLATFORMS:
Windows 95, 98, NT 4.0, 2000, ME and XP
---------------------------------------------------------------------------------
Ping is one of the most useful network debugging tools available. The first ping
program was written by Mike Muuss in December 1983 for use on Unix machines. Muuss
named his program after the sonar sounds used for echolocation by submarines,
although some say ping stands for "Packet InterNet Grouper". Ping sends a small
packet of information containing an ICMP ECHO_REQUEST to a specified computer,
which then sends an ECHO_REPLY packet in return. The ping program then evaluates
this reply, and a report is shown. You can check several things with the ping
program: can you reach another computer, how long does it take to bounce a packet
off of another site, ... You can ping either a domain name, or an IP address.
Functionality to show domain names when using IP addresses is supported. Even
routing options are available, alas only 9 routes can be shown due to the
structure of the IP header (RFC 792). Why did I write my own ping program?
There are two main reasons: a) It wanted to know how the ping program worked. I
found it really intriguing and was very curious and b) There was a need for a
better ping program here at the lab where I work.
Usage:
fping
[-n count] [-h TTL] [-v TOS] [-r routes] [-a] [-f] [-b(-)] [-i]
[-l] [-T] [-d ping_data] [-H filename]
Options:
-s : data_size in bytes up to 65500
-S : size sweep. Ping with size1, size1 + 1, ..., size 2 datalength
-c : continuous ping (higher priority than -n)
to see statistics and continue - type Control-Break;
to stop - type Control-C.
-t : time between 2 pings in ms up to 5000
-w : timeout in ms to wait for each reply
-n : number of echo requests to send
-h : number of hops (TTL: 1 to 128)
-v : Type Of Service (0 to 255)
-r : record route (1 to 9 routes)
-a : resolve addresses to hostnames
-f : set Don't Fragment flag in packet
-b : beep on every successful reply (- to beep on timeout)
-i : use ICMP dll instead of raw socket (disables -r)
-l : limit the output to ping results and errors
-T : print timestamp with each reply
-d : ping with specified data
-H : get hosts from filename (comma delimited, filename with full path)
fping uses raw sockets. This can be a problem for NT / 2000 system
users without administrator rights. Raw socket creation will fail
due to a silly and useless socket protection. Fping will switch
to the ICMP dll if this happens (to ping the micro$oft way). To
disable this protection (and take full advantage of fping) you can
do the following:
a) NT4 users should change / add the following registry variable
and set its value to DWORD 1:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Afd\Parameters\DisableRawSecurity
b) 2000 users should set the following registry variable to DWORD 1
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\AllowUserRawAccess
after you change the registry, you will need to reboot.
You can also run the reg file in accordance with your os.
Return Values:
Reply: 0
Reply timed out: 1
Host not found: 2
Packet size exceeds MTU: 3
Too few bytes: 4
Non-echo type: 5
Send questions (and bug reports) 2 support@kwakkelflap.com
---------------------------------------------------------------------------------
Legal mumbo jumbo :
This program and the accompanying documentation are Copyright (C) 2001 - 2002
by Kwakkelflap. You are allowed to redistribute it, provided that all
the files in the original archive are distributed together and no changes
are made to any file in the distribution. You can't charge for the
program, only for distributing it. You have to clearly identify me
(Wouter Dhondt) as the author.
This program comes without any warranty either implied or expressed. In no
case shall the author be liable for any damage or unwanted behaviour of any
computer hardware and/or software.
The same things in English:
- I own it. It's mine. Muahahaha! (But I let you use it too.)
- I can't guarantee that it works, or that it works correctly.
- If it breaks, it's your fault. But you do get to keep the pieces.
- If it breaks something else, it's your fault too.
- If you copy it, don't claim that you've made it yourself, or
change it in any way; and copy both program and documentation.
- You are free to offer the program on your web page. All I ask for
is that you give a link back to mine, and that you state that the
program was made by Wouter Dhondt.
---------------------------------------------------------------------------------
Known bugs: none
Possible future enhancements:
- loose and strict route ping options
- enable ICMP route options
- other ping options
---------------------------------------------------------------------------------
Revision History:
Version 2.09 (25/11/02)
- Bug fix: # of bytes with raw socket ping was incorrect
Version 2.08 (07/11/02)
- Fping size sweep
- Ping with specified data
- Retrieve hosts from comma delimited filename
- Removed self made linked list and using STL
Version 2.07 (25/06/02)
- Fping crashed in ICMP ping if no host was found with IP address
- Continue ping if host can't be found from IP address
- Space between return trip time and "ms" to allow better parsing
- Option to print timestamp with each reply
Version 2.06 (12/03/02)
- limit output option
- return values
Version 2.05 (16/10/01)
- ICMP WSAStartup & WSACleanup bug resolved.
- RAW Socket receive error time is now correct
- Usage programdir truncated
- Better invalid option parsing support
- Cleaned IP options struct (number of echo requests)
- Ping multiple hosts
- Reverse beep option
Version 2.04 (29/08/01)
- Zero ping statistics bug resolved
- ICMP dll option
- switch to ICMP dll if raw socket creation failed
- /? | -? gives usage info
- resolving addresses to hostnames (includes routing)
- internal IP options struct changed
- Don't Fragment flag can be set
- Option to beep on every successful reply
Version 2.03 (04/07/01)
- Routing
Version 2.02 (03/07/01)
- Generic error log messages instead of numbers as 10065
- Adjustable # of hops (TTL)
- Adjustable TOS
E-mail Forging
E-mail Forging allows an attacker to disguise the source of an e-mail and send it to the victim. Most attackers use this technique to fool the victim into believing that somebody else has sent the particular e-mail.
Q.How to use this technique?
A. Let's Start:
Step 1) Start the Shell Prompt or Command Prompt and type the command below which is bold:
$> telnet mailserver.com 25
I am using the word "mailserver.com", who does not really exist. This is your home work to find the
real mailserver.
Step 2) Once you are connected to the mail daemon of a remote mail server, you would be greeted with a
message similar to the following:
220 mailserver.com ESMTP Sendmail 8.12.11/8.12.11; Wed,
5 May 2003 00:18:26 -0700
Step 3) Now in command prompt write the commands sequentially as follows which are bold:
i) helo microsoft.com
ii) mail from: billgates@microsoft.com
iii) rcpt to: abc@victim.com
iv) data
v) Dear Victim,
My name is Bill Gates and I am the chairman of Microsoft Corporation. I would like to offer you
a job. If you are interested in working for me, then please reply to this e-mail or give me call at
xx-xxxxxxxxxxxx.
Thanks,
William Gates
vi) . (This dot is necessary after writing mail)
Q.How to use this technique?
A. Let's Start:
Step 1) Start the Shell Prompt or Command Prompt and type the command below which is bold:
$> telnet mailserver.com 25
I am using the word "mailserver.com", who does not really exist. This is your home work to find the
real mailserver.
Step 2) Once you are connected to the mail daemon of a remote mail server, you would be greeted with a
message similar to the following:
220 mailserver.com ESMTP Sendmail 8.12.11/8.12.11; Wed,
5 May 2003 00:18:26 -0700
Step 3) Now in command prompt write the commands sequentially as follows which are bold:
i) helo microsoft.com
ii) mail from: billgates@microsoft.com
iii) rcpt to: abc@victim.com
iv) data
v) Dear Victim,
My name is Bill Gates and I am the chairman of Microsoft Corporation. I would like to offer you
a job. If you are interested in working for me, then please reply to this e-mail or give me call at
xx-xxxxxxxxxxxx.
Thanks,
William Gates
vi) . (This dot is necessary after writing mail)
April 02, 2010
Subscribe to:
Posts (Atom)