Using Backtrack 4: Information Gathering: Route: 0trace

Information Gathering: Route: 0trace

Opening Instructions:

Usage: /usr/local/sbin/0trace.sh iface target_ip [ target_port ]

Purpose:

This tool is designed to circumvent routers that block regular ICMP packets (pings and traceroutes, among others) by enumerating hosts (servers and routers). When you can’t use traceroute because ICMP is blocked, you can get similar functionality with 0trace, with the one “gotcha” that you’ve got to establish a TCP session with your target. In practice this isn’t that hard, depending on the type of target: just visit the site, or try to login to the server, or use your imagination.

Stage:

Information Gathering

Home Page:

http://lcamtuf.coredump.cx/
If you’re interested in this website, you definitely want to visit coredump.cx.

More Information:

http://www.question-defense.com/2010/05/22/backtrack-4-information-gathering-route-0trace-traceroute-firewall-bypass-tool

http://tools.securitytube.net/index.php?title=0trace