Introduction to Ping!!!

Genius

Contributor
TCP/IP stands for Transmission Control Protocol/Internet Protocol. It

tells computers that are hooked up to the Internet how to package up

messages into packets and how to read packets these packets from other

computers. Ping uses TCP/IP to make its packets.

**********************************************

"Ping" is a command that sends a feeler out from your computer to another

computer to see if it is turned on and hooked to the same network you are

on. On the Internet there are some ten million computers that you can ping.

Ping is a command you can give, for example, from the Unix, Windows 95 and

Windows NT operating systems. It is part of the Internet Control Message

Protocol (ICMP), which is used to troubleshoot TCP/IP networks. What it does

is tell a remote computer to echo back a ping . So if you get your ping

back, you know that computer is alive. Furthermore, some forms of the ping

command will also tell you how long it takes for a message to go out to that

computer and come back again.

But how does your computer know that the ping it just sent out actually

echoed back from the targeted computer? The datagram is the answer. The ping

sent out is a packet, and like any packet it is wrapped around a datagram.

If the returning ping holds this same datagram, you know it was your ping

that just echoed back.

The basic format of this command is simply:

ping hostname

where "hostname" is the Internet address of the computer you want to check out.

When I give this command from Sun Release 4.1 Unix, I get the answer

"hostname is alive."

**************************************

TECHNICAL TIP: Because of the destructive powers of ping, many Internet

Service Providers hide the ping program in their shell accounts where

clueless newbies can't get their hands on it. If your shell account says

"command not found" when you enter the ping command, try:

/usr/etc/ping hostname

The flood ping is a simple example. If your operating system will let you

get away with giving the command:

-> ping -f hostname

it sends out a veritable flood of pings, as fast as your ISP's host

machine can make them. This keeps the host you've targeted so busy echoing

back your pings that it can do little else. It also puts a heavy load on

the network.

Hackers with primitive skill levels will sometimes get together and use

several of their computers at once to simultaneously ping some victim's

Internet host computer. This will generally keep the victim's computer too

busy to do anything else. It may even crash. However, the down side (from

the attackers' viewpoint) is that it keeps the attackers' computers tied

up, too.

NETIQUETTE NOTE: Flood pinging a computer is extremely rude. Get caught

doing this and you will be lucky if the worst that happens is your on-line

service provider closes your account. Do this to a serious hacker and you

may need an identity transplant.

If you should start a flood ping kind of by accident, you can shut it off by

holding down the control key and pressing "c" (control-c).



Source:
http://attrition.org/shame/www/gd23.orig.html

http://www.secinf.net/harmless_hacking_book/_Internet_for_Dummies_Linux_TCPIP_port_surfing_.html
 
Umm only original stuff here please. Moving it out of here. Mr. genius please post the source to the original article in case you like to share it with us the next time.
 
Back
Top