Simple Ping Sweep Using Notepad


 Simple Ping Sweep Using Notepad

This code is a simple batch script for ping sweep if u on the network. Just run it in .bat extension.But what is Ping sweep? Ping sweep  is a technique used to determine which of a range of IP addresses map to live hosts. It consists of ICMP ECHO requests sent to multiple hosts. If a given address is live, it will return an ICMP ECHO reply. A ping is often used to check that a network device is functioning. To disable ping sweeps on a network, administrators can block ICMP ECHO requests from outside sources.  
Also known, basic network scanning technique used to determine which of a range of IP addresses map to live hosts (computers). Whereas a single ping will tell you whether one specified host computer exists on the network, a ping sweep consists of ICMP (Internet Control Message Protocol) ECHO requests sent to multiple hosts. If a given address is live, it will return an ICMP ECHO reply. Ping sweeps are among the older and slower methods used to scan a network.


Copy the code below.

@echo off
cls
@color 0A
echo
echo ********************************
echo *  Ethical Hacking Tutorials Blogspot    *
echo ********************************
echo.
for /l %%a in (1,1,255) do (
ping -n 1 10.19.127.%%a | find "Reply"
)
----------------------------------------------------------------------
 Paste this code in notepad, then save it in "ping sweep.bat". copy include the quote. Save it
Share:

0 comments:

Post a Comment

DISCLAIMER

The information provided on hottechtips.blogspot.com is to be used for educational purposes only. The website creator is in no way responsible for any misuse of the information provided. All of the information in this website is meant to help the reader develop a hacker defense attitude in order to prevent the attacks discussed. In no way should you use the information to cause any kind of damage directly or indirectly. The word “Hack” or “Hacking” on hottechtips.blogspot.com should be regarded as “Ethical Hack” or “Ethical hacking” respectively. You implement the information given at your own risk.