ICMPScan

ICMPScan scans the specified address, or addresses, for ICMP responses.
Download

ICMPScan Ranking & Summary

Advertisement

  • Rating:
  • License:
  • GPL
  • Price:
  • FREE
  • Publisher Name:
  • Dave Armstrong
  • Publisher web site:
  • http://www.bindshell.net/tools/sslcat

ICMPScan Tags


ICMPScan Description

ICMPScan scans the specified address, or addresses, for ICMP responses. ICMPScan scans the specified address, or addresses, for ICMP responses.Usage:icmpscan target Options:-i, --interfaceListen on the specified interface. If unspecified, icmpscan will examine the routing table and select the most appropriate interface for each target address.-c, --promiscPut in interface into promiscuous mode. As this option increases the load on the system in general, it should only be used if spoofing of source packets address is enabled with the "-A" option.-A, --addressSpecify the source IP address of generated packets.-t, --timeoutSpecify the timeout, in milli-seconds, before retrying.-r, --retriesSpecify the number of attempts to elicit a particular ICMP response.-f, --fileRead target list from the specified file.-E, -P, --echo, --pingCheck of ICMP Echo responses.-T, -S, --timestampCheck for ICMP Timestamp responses.-N, -M, --netmaskCheck for ICMP Netmask responses.-I, --infoCheck for ICMP Info responses.-R, --routerCheck for ICMP Router Solicitation responses.-v, --verboseIncrease the output verbosity.-B, --debugTarget SpecificationThe simplest case is listing single hostnames or IP addresses on the command line. If you want to scan a subnet of IP addresses, you can append /mask to the hostname or IP address. mask must be between 0 (scan the whole Internet) and 32 (scan the single host specified). Use /24 to scan a class "C" address and /16 for a class "B". There is also a more powerful notation which lets you specify an IP address using lists/ranges for each element. Thus you can scan the whole class "B" network 192.168.*.* by specifying "192.168.*.*" or "192.168.0-255.0-255" or even "192.168.1-50,51-255.1,2,3,4,5-255". And of course you can use the mask notation: "192.168.0.0/16". These are all equivalent. If you use asterisks ("*"), remember that most shells require you to escape them with back slashes or protect them with quotes.Examples:The following example checks the first 16 addresses in the 192.168.1.0/24 netblock for all ICMP responses. The scan speed is increased by lowering the timeout value and setting the number of retries to 1: > icmpscan -t 500 -r 1 192.168.1.0-16192.168.1.0: Echo (From 192.168.1.17!)192.168.1.0: Address Mask (From 192.168.1.17!)192.168.1.7: Echo192.168.1.7: Timestamp 192.168.1.7: Address Mask 192.168.1.8: Echo192.168.1.8: Address Mask To display failed probes, increase the output verbosity: > icmpscan -v 192.168.1.1192.168.1.1: -- No response to Echo request --192.168.1.1: -- No response to Timestamp request --192.168.1.1: -- No response to Netmask request --192.168.1.1: -- No response to Info request --192.168.1.1: -- No response to Router Solicitation request --Individual ICMP types can be checked for by listing their corresponding flags on the command line: > icmpscan -v --echo --netmask 192.168.1.7192.168.1.7: Echo192.168.1.7: Address Mask Requirements:· libpcap· libdnet (libdumbnet under Debian)INSTALLATION ./configure make make install


ICMPScan Related Software