About | ACP | Buy Stuff | Forum | Industry Watch | Learning Curve | Search | Test Drive
Home » ACP » Spike


Not old
Network (F)utility.

macOS comes bundled with a network utility suite aptly called Network Utility. It's just a wrapper for command line Unix tools. Nothing more. Not too swift. It has to pipe control through to the command line and then back. Speed isn't its hallmark. Beauty isn't either.

Spike is also a network utility, and it's named after the famous 007 Goldeneye scene where Izabella Scorupco tries to nail Alan Cumming's grid so the sparks start flying. Spike runs its own native code. It's faster. And prettier. And easier to use - you don't finding yourself parsing away URLs for example - Spike does that automatically. And once you submit a query you never have to type it in again.

Not old Network (F)utility in other words.


Scan a block of IPs to see who's in the neighbourhood. Ping to see who's at home. The 17 list found here was assembled by Spike. Scan as much as an entire B block with 16777216 IPs all at once. Click Copy and catch put scan on the clipboard.


Or reverse DNS. Intuitively. Find canonical names, aliases, all IPs for a given domain or IP. Identify machines on your local network. Useful if you want to find providers for a given domain. [Take the IP and put it in Spike's Whois.]


Get a web page. Normally on port 80 but you choose the one you want. Get the actual source with all the headers intact - something your browser doesn't show you. Spoof any user agent you want: Spike comes with several dozen and you can add your own. More reveals a special sheet where you can set the accepted data types, spoof cookies, set the host for HTTP/1.1, and even spoof a refer(r)er URL.


Get the headers only. Find out about the server, the OS, cookies, session IDs, last modified date/time, lots of good stuff. Has the same More sheet as Get. Some servers are kinky and send back different information for HEAD requests - use this tab and uncover it all.


Probe a server as many times as you like. Set the number of packets to zero to create an unending flood.


Scan for open TCP ports. Blazingly fast.


See how packets make their way to the target. Find bottlenecks, misconfigured routers.


Find out who's behind the domains. Comes with over 100 whois servers; you can add your own; default is GeekTools which automatically takes you to ARIN or overseas. Mark unnecessary text to be ignored and you won't see it again.

See Also
Learning Curve: Spiking the Network

About | ACP | Buy Stuff | Forum | Industry Watch | Learning Curve | Search | Test Drive
Copyright © Rixstep. All rights reserved.