Solved

igmp

Posted on 2001-08-17
9
203 Views
Last Modified: 2010-04-06
right i want to write a program to send a igmp message
+++atho  now how do i do it if i add a port that just sends tcp ip doesent it ?
0
Comment
Question by:catbecks
  • 5
  • 4
9 Comments
 
LVL 1

Author Comment

by:catbecks
Comment Utility
also what port do i use for an echo request :-)
0
 
LVL 7

Expert Comment

by:God_Ares
Comment Utility
this link
http://www.djernaes.dk/martin
will provide you with a good sample for pinging a host.
this is for icmp

what on earth do you want to do with igmp

for igmp check rfc 2236
0
 
LVL 1

Author Comment

by:catbecks
Comment Utility
disconect peoples modems :-)
0
 
LVL 7

Expert Comment

by:God_Ares
Comment Utility
don't you have to spoof the packet? My knolage on igmp is = nil. but a book is telling me that it's used for multicasting.
check
http://msdn.microsoft.com/
for additional info.
0
Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

 
LVL 1

Author Comment

by:catbecks
Comment Utility
+++atho is a modem AT command
a full explanation of what im trying to write is here
theres a program wrote in c there which does what im trying to do in delphi

http://newdata.box.sk/hackingtruths/modems.zip
0
 
LVL 1

Author Comment

by:catbecks
Comment Utility
ive answered it myself so i get the points http://overbyte.alexid.fr/frame_index.html?redirTo=/products/ics.html
a great set of free components !!!
0
 
LVL 7

Expert Comment

by:God_Ares
Comment Utility
Really,.. I have only found a ping component. I guezz i'm overlooking it.
0
 
LVL 1

Author Comment

by:catbecks
Comment Utility
go on then u can have the points
i still cant do what im trying to
0
 
LVL 7

Accepted Solution

by:
God_Ares earned 300 total points
Comment Utility
well to fully earn points look at my last project

http://www.angelfire.com/ok/GODARES/downl.html

you might wana download the last file and check netkit.pas verry handy for PingIng...
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Objective: - This article will help user in how to convert their numeric value become words. How to use 1. You can copy this code in your Unit as function 2. than you can perform your function by type this code The Code   (CODE) The Im…
Creating an auto free TStringList The TStringList is a basic and frequently used object in Delphi. On many occasions, you may want to create a temporary list, process some items in the list and be done with the list. In such cases, you have to…
This video discusses moving either the default database or any database to a new volume.
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

7 Experts available now in Live!

Get 1:1 Help Now