Ping: Difference between revisions

From Hackepedia
Jump to navigationJump to search
No edit summary
mNo edit summary
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
ping is a tool written by the late Mike Muus to measure latency and round-trip time between two hosts connected by a network. Often it is also used to simply debug if the other host is up.  It works by sending an [[ICMP]] type 8 packet to the remote host which replies with an [[ICMP]] type 0 packet.  Sometimes there is a [[firewall]] preventing a ping from receiving a reply.
ping is a tool written by the late Mike Muus to measure latency and round-trip time between two hosts connected by a network. Often it is also used to simply debug if the other host is up.  It works by sending an [[ICMP]] type 8 (request) packet to the remote host which replies with an [[ICMP]] type 0 (reply) packet.  Sometimes there is a [[firewall]] preventing a ping from receiving a reply.


This would look like so:
This would look like so:
Line 8: Line 8:


If you're using a packet [[sniffer]] you should see both the request and the reply if things are working unmolested.
If you're using a packet [[sniffer]] you should see both the request and the reply if things are working unmolested.
# tcpdump -i [[Variables|rl0]] host gateway.home.lan
  18:13:30.601477 IP laptop.home.lan > gateway.home.lan: ICMP echo request, id 36372, seq 2, length 64
  18:13:30.601477 IP laptop.home.lan > gateway.home.lan: ICMP echo request, id 36372, seq 2, length 64
  18:13:30.601773 IP gateway.home.lan > laptop.home.lan: ICMP echo reply, id 36372, seq 2, length 64
  18:13:30.601773 IP gateway.home.lan > laptop.home.lan: ICMP echo reply, id 36372, seq 2, length 64

Latest revision as of 15:22, 16 February 2006

ping is a tool written by the late Mike Muus to measure latency and round-trip time between two hosts connected by a network. Often it is also used to simply debug if the other host is up. It works by sending an ICMP type 8 (request) packet to the remote host which replies with an ICMP type 0 (reply) packet. Sometimes there is a firewall preventing a ping from receiving a reply.

This would look like so:

$ ping -c 1 www.yashy.com
PING mail.yashy.com (206.248.137.44): 56 data bytes
--- mail.yashy.com ping statistics ---
1 packets transmitted, 0 packets received, 100.0% packet loss

If you're using a packet sniffer you should see both the request and the reply if things are working unmolested.

# tcpdump -i rl0 host gateway.home.lan
18:13:30.601477 IP laptop.home.lan > gateway.home.lan: ICMP echo request, id 36372, seq 2, length 64
18:13:30.601773 IP gateway.home.lan > laptop.home.lan: ICMP echo reply, id 36372, seq 2, length 64

One of the original DoS was a simple ping flood. If you have more bandwidth then your victim, you can do

# ping -f example.com.

and slow your victim to a grinding halt.

A similar tool to ping would be traceroute.