Tool and Usage
This security tool enables the user to perform hop enumeration (similar to traceroute). Instead of sending actual packets, it uses an established TCP connection.
Why this tool?
0trace is a small Python-based script to perform reconnaissance. It provides traceroute-like functionality. Additional data can be gathered about the network and its devices using this method.
How it works
The benefit of using an established connection is staying off the radar of a firewall. This technique works due to the session already being establed. By using the existing connection and send TTL-based probes, no suspicion will be raised.
0trace.py is a remake by Jon Oberheide of the original 0trace tool by Michal Zalewski.
Usage and audience
0trace.py is commonly used for bypassing firewall rules, bypassing security measures, or reconnaissance. Target users for this tool are pentesters and security professionals.
- Command line interface
Example usage and output
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
- + Project is mature (10+ years)
- - Unknown project license
Supported operating systems
0trace.py is known to work on Linux.
Several dependencies are required to use 0trace.py.
Similar tools to 0trace.py:
FireAway is a security tool to test the security of a firewall by trying to bypass its rules. It will use different methods to hide data or avoid detection by the firewall itself. This tool can be used for both defensive as offensive security.
Opensvp is a security tool to test firewall software. It uses protocol level attacks to determine if the firewall is vulnerable to a type of attack.
Chiron is a security assessment framework for IPv6 testing. It can be used during penetration testing or analysis of network devices. Read how it works in this review.
This tool page was updated at . Found an improvement? Help the community by submitting an update.