O'Reilly logo

Kali Linux 2018: Assuring Security by Penetration Testing - Fourth Edition by Shakeel Ali, Tedi Heriyanto, Lee Allen, Gerard Johansen, Damian Boodoo, Alex Samm, Shiva V. N Parasram

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

ping

ping is the most famous tool that is used to check whether a particular host is available. The ping tool works by sending an Internet Control Message Protocol (ICMP) echo request packet to the target host. If the target host is available and the firewall is not blocking the ICMP echo request packet, it will reply with the ICMP echo reply packet.

The ICMP echo request and ICMP echo reply are two of the available ICMP control messages. For other ICMP control messages, you can refer to the following URL: https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol#Control_messages.

Although you can't find ping in the Kali Linux menu, you can open the console and type the ping command, along with its options.

To use ping, you can just ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required