Dive into the Windows command-line interface and try out the utilities Ping Tracert, and PathPing. Discover how Ping is a test for reachability, Tracert is tracing the route and reporting the results, and PathPing combines features of Ping and Tracert by sending packets to each router and then computing the results.
- [Instructor] When conducting ethical hacking,…we'll see that behind the scenes,…the protocol ICMP is used…because it's a very chatty protocol.…We're going to take a look at Ping…and Tracert and we're going to take a look at…one more utility called PathPing to see what…kind of information it gives us just by using that utility.…So we are familiar with Ping.…Ping is essentially utility used…to test for reachability using the protocol ICMP…or Internet Control Message Protocol.…
It just wants to see if it can reach it,…if it's talking back to us and it's a very simple protocol.…We put in Ping and in Windows operating system,…it does it four times and stops.…But what about Tracert or traceroute in Linux?…Tracert in Windows, it's a command line tool…that traces the route packet across the Internet…and provides route path and transit times.…How does it work?…Well, it uses specially crafted ICMP packets…which purposely time out,…meaning the time to live value…in the Internet header times out…and then it returns the results,…
Note: Our Ethical Hacking series maps to the 18 parts of the EC-Council's certification exam. This course maps to the 02 Footprinting and Reconnaissance domain.
- Using competitive intelligence
- Hacking with search engines
- Using email for footprinting
- Getting social
- Mirroring websites
- Using Ping, Tracert, nslookup, and dig
- Taking footprinting countermeasures
- Pen testing for footprinting