The ping command line tool is a build in tool, in both Windows and the Linux operation system, the command line tool is used to check if a target system is up or down.
A ping, as in ping pong is a special package that send from one device to another device, the package called ICMP (Internet Control Message Protocol) and by sending the ping package the other device replay with another package, the default information from the ping command is the state of the network and the remote device. if the remote device is up, it replay to ping and the time it take the ping command to reach the target device.
As ping is a command line tool, it have some command parameters that can be used:
- -a – this parameter will tell the ping command to try and resolve the IP address into a hostname (DNS) name:ping -a 188.8.131.52 will return google.com as the hostname.
- -t – the ping command, under windows operation system will send up to 4 ping request, if it use with the -t parameter it will continue to ping till someone stop it….
Please use the ‘ping /?’ command to get the ping parameters.
Ping of death
ping of death is a type of attack that the attacker manipulate the ping command, by changing one or more of the ping header data causing it to take down the target device that the ping was send to, this due to a bug in the ping command.
Ping flooding is another ping attack that cause denial-of-service attack to the victim compute by sending a lot of ping requests to the target computer and the target computer at some point was unable to handle all the ping requests that cause the traffic to fails and not to reach to the target system.
Please also check our open port check tool.