TCPTRACEROUTE
DISCRIPTION
- tcptraceroute is a traceroute implementation using TCP packets.
- The
more traditional traceroute sends out either UDP or ICMP ECHO packets
with a TTL of one, and increments the TTL until the destination has been
reached.
- By
printing the gateways that generate ICMP time exceeded messages along
the way, it is able to determine the path packets are taking to reach
the destination.
- The
problem is that with the widespread use of firewalls on the modern
Internet, many of the packets that traceroute sends out end up being
filtered, making it impossible to completely trace the path to the
destination.
- However,
in many cases, these firewalls will permit inbound TCP packets to
specific ports that hosts sitting behind the firewall are listening for
connections on.
- By
sending out TCP SYN packets instead of UDP or ICMP ECHO
packets, tcptraceroute is able to bypass the most common firewall
filters.
HOW TO OPEN TCPTRACEROUTE
- To open traceroute , follow the path :-
- BackTrack > Information Gathering > Network Analysis > Route Analysis > tcptraceroute
- See the below image for more details -
Options
-h
Display help
- -n
- Display
numeric output, rather than doing a reverse DNS lookup for each hop. By
default, reverse lookups are never attempted on RFC1918 address space,
regardless of the -n flag.
- -N
- Perform a reverse DNS lookup for each hop, including RFC1918 addresses.
- -f
- Set the initial TTL used in the first outgoing packet. The default is 1.
-
- -m
- Set the maximum TTL used in outgoing packets. The default is 30.
- -p
- Use the specified local TCP port in outgoing packets. The default is to obtain a free port from the kernel using bind(2) traditional traceroute, this number will not increase with each hop.
-
-
- -s
- Set the source address for outgoing packets. See also the -i flag.
-
- -i
- Use the specified interface for outgoing packets.
- -q
- Set the number of probes to be sent to each hop. The default is 3.
- -w
- Set the timeout, in seconds, to wait for a response for each probe. The default is 3.
-
- -S
- Set the TCP SYN flag in outgoing packets. This is the default, if neither -S or -A is specified.
-
- -A
- Set
the TCP ACK flag in outgoing packets. By doing so, it is possible to
trace through stateless firewalls which permit outgoing TCP connections.
- -E
- Send ECN SYN packets, as described in RFC2481.
- There are others options also , try yourself and learn more about this tool .
- NEW EXAMPLE
-
-
- FOR MORE REAL WORLD EXAMPLES CLICK THE BELOW LINK :-
-
- THIS TUTORIAL IS JUST FOR EDUCATIONAL PURPOSE ONLY/-
|
Comments