TraceRoute assists in discovering the topology of a network along with any intermediary devices. Discover other options for tools that visually trace a path and assess the performance of the network. Discover how analyzing the path data takes to get to a destination can expose potential weak spots.
- [Instructor] When analyzing the path…from point A to point B,…we know that we have a number…of different tools at our hands,…and some of them which are used for troubleshooting.…Nonvisual tools are done in the command line,…and include Tracert.…That's done in Windows.…It helps us discover the topology of a network…along with any intermediary devices.…It also kind of gives us an idea of any latency issues.…It's a high-level view, runs fairly quickly,…and in Linux we would use Traceroute…that traces the route packets take across the network,…but this uses UDP by default.…
If we wanted to have a little more discovery…and then statistics behind it,…we would use PathPing.…This gives us discovery with statistics,…again for troubleshooting,…but it will tell you the path it took…from point A to point B.…Other nonvisual tools include Networktools.com,…where I can go in and this is again non-graphical,…it's just doing a quick trace if I wanted to, or ping.…There's other things on here, who is DNS,…but let's just do a quick ping of Google.com.…
Note: Our Ethical Hacking series maps to the 18 parts of the EC-Council's certification exam. This course maps to the 02 Footprinting and Reconnaissance domain.
- Using competitive intelligence
- Hacking with search engines
- Using email for footprinting
- Getting social
- Mirroring websites
- Using Ping, Tracert, nslookup, and dig
- Taking footprinting countermeasures
- Pen testing for footprinting