Questions tagged [ping]
21 questions
17
votes
1 answer
How to do a privileges escalation with ping?
I am trying to achieve a privilege escalation. I have a virtual machine on Linux and I escaped from an rbash terminal. I have now a "normal" user terminal. My user is not in the sudoers file.
Is it possible to perform a privilege escalation using…
mb3354
- 171
- 1
- 1
- 5
6
votes
3 answers
Ping Blocking: How to do? How to break?
I can access each page of a site through the browser (firefox). I can also see the ip and port address in firebug, but when I open cmd->ping site ->it says "request timeout".
I also tried traceroute. The trace was something like this
1. my router
…
Pointer
- 111
- 1
- 1
- 5
4
votes
1 answer
Reply from “nsa.gov” while pinging “gen.lib.rus.ec”
Running ping gen.lib.rus.ec (a Library Genesis server) returns this output:
PING gen.lib.rus.ec (91.200.14.96) 56(84) bytes of data
64 bytes from nsa.gov (91.200.14.96): icmp_seq=1 ttl=57 time=69.1 ms
Why nsa.gov?
Kloss
- 43
- 2
3
votes
1 answer
Why are some Bluetooth devices susceptible to ping floods and some are not?
Just for fun, I've ping flooded my bluetooth speaker at home using l2ping on Linux and I was unable to connect to it as the pinging continued. I've tried flooding my phone and it seems to have received the packets as I got a response (just like the…
user168683
3
votes
1 answer
Is ping of death attack specific to ICMP or could it also happen with other transport protocols?
A Ping of Death attack is a denial-of-service (DoS) attack, in which the attacker aims to disrupt a targeted machine by sending a packet larger than the maximum allowable size, causing the target machine to freeze or crash. The original Ping of…
parii
- 31
- 1
2
votes
1 answer
Why is ping special: why do "unprivileged pings" have to be enabled?
Rootless podman, by proxy of the Linux Kernel, has restrictions against ping,
It is most likely necessary to enable unprivileged pings on the host.
Why do unprivileged pings need to be enabled? And what is the detriment to be able to send a ping…
Evan Carroll
- 2,325
- 4
- 22
- 29
2
votes
1 answer
Nessus Target Availability
I need to write a script (I am not asking for script !) in order to verify if target Servers are available (Up or Down) for Nessus scan or not. The problem is that, sometimes even if ping does not work on target IP address, Nessus still can scan…
tech_enthusiast
- 435
- 1
- 5
- 19
1
vote
0 answers
What other than ping tools might be suitable for overwhelming a server that has disabled its functionality of being pinged?
The following code:
#!/usr/bin/bash
TARGETS=("nalog.gov.ru" "www.nalog.gov.ru"
"customs.gov.ru" "www.customs.gov.ru"
"ffs.ru" "www.ffs.ru"
"crimea-post.ru" "www.crimea-post.ru"
"minfin.gov.ru" "www.minfin.gov.ru")
echo "This script is going to…
John Smith
- 11
- 1
1
vote
1 answer
difference between icmp ping scan and normal ping scan
I'm learning to use nmap on my kali linux and was testing out the various types of scans available in it.
-sn is for ping scan which basically prevents nmap from scanning all the ports (and probably scans one port).
Then scrolling down the nmap help…
weebHackr
- 13
- 4
1
vote
2 answers
In what situations should a node ping/not ping?
I was recently looking at a network in which the client-machines could access a webservice endpoint but could not ping it.
And there are other machines that can ping the webservice endpoint, but which do not utilize it. However, these other machines…
leeand00
- 1,297
- 1
- 13
- 21
1
vote
0 answers
can ping the server but not able to access
i am able to ping the server machine named "tallyserver" which is windows server 2003 machine configured with automatically IP address setting but when i am going to Network, sometimes it shows the machine and some times not. when i click the…
Deepak
- 11
- 2
1
vote
3 answers
I can't execute commands through proxychains
I am trying to execute a ping throught proxychains, after create SSH tunnel, but the response of the petition is Destination Host Unreachable.
Concretly, I want to do a lab about pivoting. The attacker machine have visibility over A machine, but not…
Iratzar Carrasson Bores
- 196
- 1
- 13
0
votes
0 answers
Googleupdate.exe runs ping encoded - Is this expected?
I was looking at our M365 Defender and was doing some looking around. I noticed the process GoogleUpdate.exe run an encoded ping.
The command was "GoogleUpdate.exe" /ping .
I tried decoding using chef and below is what I saw. Some xml…
Nina G
- 133
- 6
0
votes
1 answer
Subdomains resolving to bogon IPs
During experimentation with the gobuster tool, and trying to find the subdomains matches of a domain (let's call that testdomain.com), I got some strange results and I explain.
The command used was $ gobuster dns -d testdomain.com -w mywordlist.txt…
orespan
- 1
- 1
0
votes
0 answers
Security Risks Of Letting Users Send Pings On System
Through a chatbot I am developing, users will have the ability to ping servers. The command is .ping and this will be passed to python which will use subprocess.run(f'ping ').
This will…