0trace
Tool and Usage
Project details
- Programming languages
- C, shell script
- Author
- Michał Zalewski
- Latest release
- No release found
Project health
Links
Project website |
Why this tool?
0trace is a reconnaissance tool to perform so-called hop enumeration within an established TCP connection. The goal is to allow traceroute-like functionality, yet in an alternative way. It can be used to bypass firewall rules. Tools like 0trace are typically used during pentesting assignments.
How it works
This tool works by leveraging an existing TCP session for a protocol like HTTP. As the network or firewall device already allowed the connection, this reuse of the connection is typically not detected.
Usage and audience
0trace is commonly used for bypassing firewall rules, bypassing security measures, or penetration testing. Target users for this tool are pentesters and security professionals.
Features
- Command line interface
Installation
Supported operating systems
0trace is known to work on Linux.
0trace alternatives
Similar tools to 0trace:
FireAway
FireAway is a security tool to test the security of a firewall by trying to bypass its rules. It will use different methods to hide data or avoid detection by the firewall itself. This tool can be used for both defensive as offensive security.
opensvp
Opensvp is a security tool to test firewall software. It uses protocol level attacks to determine if the firewall is vulnerable to a type of attack.
Chiron
Chiron is a security assessment framework for IPv6 testing. It can be used during penetration testing or analysis of network devices. Read how it works in this review.
This tool page was updated at . Found an improvement? Help the community by submitting an update.
Related tool information
Categories
This tool is categorized as a firewall testing tool and network reconnaissance tools.