Nmap Development mailing list archives

Re: Call for testers: Nping 0.1BETA1 Released.


From: "Luis M." <luis.mgarc () gmail com>
Date: Fri, 07 Aug 2009 16:55:32 +0100

Hi Jason,

Nping behaves in a slightly different way than Nmap. If you look at the
man page you'll see that there are 7 levels of verbosity. However, the
initial level is level 4 so if you specify -vN where N<4 you are
actually telling Nping to display less information. Here is a quick ref
guide:

Level 0: No output
Level 1: Fatal error messages
Level 2: Warnings and recoverable errors
Level 3: Normal but does not display sent/recv packets, just stats, etc.
Level 4: Display sent/recv packets and stats.
Level 5: Display detailed packet info.
Level 6: Display very detailed packet info.

So to sum up: every instance of -v increments verbosity level by one
(starting from level 4). -vN sets verbosity level N.

Luis.


DePriest, Jason R. wrote:
The verbose flag behaves strangely.

I was running Wireshark to verify that packets were being sent.  In
all cases they were.  However, the output looked like this:
=-=-=-=-=-=-=-=
jrdepriest@SYSTEM01 ~
$ ping 10.67.64.5
PING 10.67.64.5 (10.67.64.5): 56 data bytes
64 bytes from 10.67.64.5: icmp_seq=0 ttl=64 time=0 ms
64 bytes from 10.67.64.5: icmp_seq=1 ttl=64 time=0 ms

----10.67.64.5 PING Statistics----
2 packets transmitted, 2 packets received, 0.0% packet loss
round-trip (ms)  min/avg/max/med = 0/0/0/0

jrdepriest@SYSTEM01 ~
$ nping 10.67.64.5

Starting Nping V. 0.1BETA1 ( http://nmap.org/nping ) at 2009-08-07 16:37 ric
SENT (0.1560s) ICMP 10.67.64.16 > 10.67.64.5 Echo request
(type=8/code=0) ttl=64 id=1228 iplen=28
RCVD (0.1560s) ICMP 10.67.64.5 > 10.67.64.16 Echo reply
(type=0/code=0) ttl=64 id=743 iplen=28
SENT (1.2660s) ICMP 10.67.64.16 > 10.67.64.5 Echo request
(type=8/code=0) ttl=64 id=59191 iplen=28


jrdepriest@SYSTEM01 ~
$ nping -v 10.67.64.5

Starting Nping V. 0.1BETA1 ( http://nmap.org/nping ) at 2009-08-07 16:37 ric
SENT (0.1560s) ICMP [10.67.64.16 > 10.67.64.5 Echo request
(type=8/code=0) id=48534 seq=1] IP [ttl=64 id=55833 proto=1
csum=0x0c2d iplen=28 ]
RCVD (0.1560s) ICMP [10.67.64.5 > 10.67.64.16 Echo reply
(type=0/code=0) id=48534 seq=1] IP [ttl=64 id=765 proto=1 csum=0xe349
iplen=28 ]
SENT (1.2500s) ICMP [10.67.64.16 > 10.67.64.5 Echo request
(type=8/code=0) id=48534 seq=2] IP [ttl=64 id=57113 proto=1
csum=0x072d iplen=28 ]


jrdepriest@SYSTEM01 ~
$ nping -v0 10.67.64.5


jrdepriest@SYSTEM01 ~
$ nping -v1 10.67.64.5


jrdepriest@SYSTEM01 ~
$ nping -v2 10.67.64.5


jrdepriest@SYSTEM01 ~
$ nping -v3 10.67.64.5


jrdepriest@SYSTEM01 ~
$ nping -v4 10.67.64.5

Starting Nping V. 0.1BETA1 ( http://nmap.org/nping ) at 2009-08-07 16:37 ric
SENT (0.1560s) ICMP 10.67.64.16 > 10.67.64.5 Echo request
(type=8/code=0) ttl=64 id=6619 iplen=28
RCVD (0.1560s) ICMP 10.67.64.5 > 10.67.64.16 Echo reply
(type=0/code=0) ttl=64 id=883 iplen=28

jrdepriest@SYSTEM01 ~
$ nping -v5 10.67.64.5

Starting Nping V. 0.1BETA1 ( http://nmap.org/nping ) at 2009-08-07 16:42 ric
SENT (0.1570s) ICMP [10.67.64.16 > 10.67.64.5 Echo request
(type=8/code=0) id=26413 seq=1] IP [ttl=64 id=58450 proto=1
csum=0x01f4 iplen=28 ]
RCVD (0.1570s) ICMP [10.67.64.5 > 10.67.64.16 Echo reply
(type=0/code=0) id=26413 seq=1] IP [ttl=64 id=2069 proto=1 csum=0xde31
iplen=28 ]
SENT (1.2500s) ICMP [10.67.64.16 > 10.67.64.5 Echo request
(type=8/code=0) id=26413 seq=2] IP [ttl=64 id=65026 proto=1
csum=0xe843 iplen=28 ]
RCVD (1.2500s) ICMP [10.67.64.5 > 10.67.64.16 Echo reply
(type=0/code=0) id=26413 seq=2] IP [ttl=64 id=2070 proto=1 csum=0xde30
iplen=28 ]
=-=-=-=-=-=-=-=-=

-v works
-v1-3 do not produce any output but still send packets
-v4+ work fine

-v5 looks like the same output you get with -v
-v4 looks like the same output you get with no verbosity flag

-Jason

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org

  


_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: