The arping application is a simple command that will allow you to ping devices by hostname, IP address, or MAC address. The unfortunate part is that most device will not respond to the arp requests, which are directed broadcast ICMP echo requests, though there are some out there that do. I go into more detail below regarding pinging via MAC address by providing an example of the typical output, example output when a MAC address responds to the ICMP echo requests, and details about how to configure hosts to respond to these ICMP echo requests. I also show a couple of the switches available with arping and provide examples of using arping to ping devices by IP and host.
Ever located an old capture file and you weren’t sure what was in it or needed to grab some quick statistics about another capture file? What about needed to run statistics on multiple capture files and present them via a database or a spreadsheet? Well if you have ever run into any of these scenarios then capinfos is worth a look. The capinfos command is available via the Backtrack CLI and provides statistic information about cap files. This is one of the gems located on Backtrack that nobody ever hears about.
If you decide to remove the default kismet install on Backtrack Linux so you can then compile kismet from source you will be missing some functionality. One of the bits of functionality not installed by default on Backtrack 5 release 3 is the PCRE Regex Filters. You can easily enable this functionality by installing a single package before you run the kismet configure command when compiling the source.
I have been playing around with some of the bluetooth tools within Backtrack recently and btscanner is one of the main tools I have bene using. The btscanner application in Backtrack Linux provides two bluetooth scanning functions it calls inquiry scanning and brute force scanning. Unfortunately the package installed with Backtrack 5 release 3 will crash when attempting to use it for brute force scanning however I was able to create a fix that isn’t too messy to accomplish. Below we describe the btscanner crash in more detail and provide a way to get btscanner bluetooth brute forcing operating properly.
Clicking on the genlist menu item in Backtrack Linux opens a terminal window and outputs the genlist help menu at the top. Genlist is a Perl script written to provide an easy way to generate a list of live hosts on a network or set of networks so you can then begin analyzing those hosts. All the genlist Perl script does is call nmap with the -sP switch and parse the results so only the live IP addresses are output and as simple as it seems its a handy little tool if you do penetration testing on a regular basis. Below we describe genlist in more detail and show an example of genlist in action.