Dive into the Windows command line interface and try out the utilities PING, Tracert, and PathPing. Lisa Bock shows how ping is a test for reachability, Tracert is tracing the route and reporting the results, and PathPing combines features of Ping and Tracert by sending packets to each router and then computes results.
- [Voiceover] When conducting ethical hacking,…we'll see that behind the scenes, the protocol ICMP is used…because it's a very chatty protocol.…We're going to take a look at Ping and Tracert,…and we're going to take a look at one more utility…called PathPing to see what kind of information it gives us…just by using that utility.…So, we're familiar with Ping.…Ping is essential a utility used to…test for reachability using the protocol ICMP,…or Internet Control Message Protocol.…
It just wants to see if it can reach it,…if it's talking back to us,…and it's a very simple protocol we put in Ping,…in a Windows operating system…it does it four times and stops.…What about Tracert, or Traceroute in Linux?…Tracert in Windows is a command line tool.…It traces the route packet across the internet…and provides route path and transit times.…How does it work?…Well, it uses specially crafted ICMP packets…which purposely time out,…meaning the time-to-live value in the internet header…times out and then it returns the results…'cause it comes across as an error.…
Note: Our Ethical Hacking series maps to the 18 parts of the EC-Council's certification exam. This course maps to the 02 Footprinting and Reconnaissance domain.
- Using competitive intelligence
- Hacking with search engines
- Using email for footprinting
- Getting social
- Mirroring websites
- Using Ping, Tracert, nslookup, and dig
- Taking footprinting countermeasures
- Pen testing for footprinting