Network reconnaissance tools

Tools

Popular network reconnaissance tools

0trace (reconnaissance tool and firewall bypassing)

bypassing firewall rules, bypassing security measures, penetration testing

0trace is a reconnaissance tool to perform so-called hop enumeration within an established TCP connection. The goal is to allow traceroute-like functionality, yet in an alternative way. It can be used to bypass firewall rules. Tools like 0trace are typically used during pentesting assignments.

0trace.py (reconnaissance and firewall bypass tool)

bypassing firewall rules, bypassing security measures, reconnaissance

0trace is a small Python-based script to perform reconnaissance. It provides traceroute-like functionality. Additional data can be gathered about the network and its devices using this method.

Chiron (IPv6 security assessment framework)

network analysis, network scanning, network security monitoring

Chiron is a security assessment framework for IPv6. It provides several modules including an IPv6 scanner, IPv6 Local Link, IPv4-to-IPv6 proxy, IPv6 attack module, and IPv6 proxy. These modules help to perform an assessment, like a penetration test.

The tool uses IPv6 extension headers to create a headers chain. This may allow evading security devices like IDS, IPS, and firewalls. Due to the flexibility of the framework, the tool can also be used to perform fuzzing of the I…

IVRE (reconnaissance for network traffic)

digital forensics, information gathering, intrusion detection, network analysis

IVRE is a framework to perform reconnaissance for network traffic. It leverages other tools to pull in the data and show it in the web interface.

WarBerryPi (hardware implant for pentesting or red teaming)

information gathering, information snooping, penetration testing, red teaming

WarBerryPi is a toolkit to provide a hardware implant during Physical penetration testing or red teaming. The primary goal of the tool is to obtain as much information as possible, in a short period of time. The secondary goal is to be stealthy to avoid detection. As the name implies, the tool can be used on a small device like a RaspberryPi.

Another use-case of WarBerryPi is to be an entry point to the network. In that case, a 3G connection is suggested, to avoid the outgo…

Missing a favorite tool in this list? Share a tool suggestion and we will review it.

Related topics

Looking for more specific topics within this tool group? Have a look at the following relevant topics.