14.2. Probing the Network
Now that Woolly has collected some general information about the target, it is time for him to begin probing and prodding to see what other systems or services might be available on the network. Woolly would do this even if he has already found his way inside the firewall through some other means, such as a contract job or dial-in access. Probing gives an attacker a road map of the network, as well as a list of available services.
14.2.1. The traceroute Command
You can use the traceroute command to trace the network path from one host to another. This is useful when you want to document the network segments between two hosts. An example of the output created by traceroute is shown in Figure 14.2.
In the Windows ...