Thursday, 12 April 2012


[<MEGAPRIMER 1.0.3>0trace<G>ENUMERATION>INFORMATION GATHERING]
*Shell Script                                     *[Back Track 5R2 GNOME X64]
*Coded by Michal Zalewski            *[ 1 Secured -1 Stated - 3rd post]  

************************************************************************
0trace is a reconnaissance firewall bypassing tool that enables hop enumeration ("traceroute") within an established TCP connection, such as a HTTP or SMTP session. 
This is opposed to sending stray packets, as traceroute-type tools usually do.
Who is it written for ?
Security professionals:
provides useful additional servers for the penetration tester.
Black&Greyhat:

More punch into the firewall which popular tools like traceroute fail to do
Man 0trace

ssvdemolabs
Use nslookup to get the Public Adress
Use tracert to analyse hop enumeration and mine some info

The *** reveal a firewall in place that prevents further enumeration,lets put 0trace to the test

ssvforensics
Information dumped is both interesting to the pentester and the hacker;
  1. Failed probes means using other means ie telnet xx.xxx.xxx.xx 80 in order to generated traffic from http headers.Chances are the firewall will be defeated.
  2. Further attemps to Crack the Perimeter means using a leveraged arsernal like nmap to do more less the same for stealth and robust scans
  3. Good configurations on a firewall cannot be over emphasized.
  4. Investing in a good Intrusion Detection System is vital.
Reading List
Disclaimer
Obtain advance express permission from the owner or maintainer of the appliance 
before searching it with any automated tool for various legal and moral reasons.
Ssvforensic is not liable for what you do.

No comments:

Post a Comment