0trace

LSE toolsLSE tools0trace (319)0trace (319)

Tool and Usage

0trace is a reconnaissance tool to enable hop enumeration within an existing TCP connection. It can be used to bypass firewalls.

Why this tool?

Tools in this area are typically used during pentesting assignments.

How it works

This tool works by leveraging an existing TCP session like HTTP. As the network or firewall device already allowed the connection, this reuse of the connection is typically not detected.

Usage and audience

0trace is commonly used during penetration test.

Tool review

The review and analysis of this project resulted in the following remarks for this security tool:

Strengths

  • + The source code of this software is available

Author and Maintainers

0trace is under development by Michał Zalewski.

Installation

Support operating systems

0trace is known to work on Linux.

0trace alternatives

See also:

More alternative tools for 0trace

This tool page was recently updated. Found an improvement? Become an influencer and submit an update.
Project details
Latest releaseNo release found
Last updatedSept. 17, 2017

Project health

56
This score is calculated by different factors, like project age, last release date, etc.

Links

 Project website

Related terms