14.2. Probing the Network

Now that Woolly has collected some general information about the target, it is time for him to begin probing and prodding to see what other systems or services might be available on the network. Woolly would do this even if he has already found his way inside the firewall through some other means, such as a contract job or dial-in access. Probing gives an attacker a road map of the network, as well as a list of available services.

14.2.1. The traceroute Command

You can use the traceroute command to trace the network path from one host to another. This is useful when you want to document the network segments between two hosts. An example of the output created by traceroute is shown in Figure 14.2.


In the Windows ...

Get Mastering™ Network Security, Second Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.