Tool and Usage
Why this tool?
0trace is a reconnaissance tool to perform so-called hop enumeration within an established TCP connection. The goal is to allow traceroute-like functionality, yet in an alternative way. It can be used to bypass firewall rules. Tools like 0trace are typically used during pentesting assignments.
How it works
This tool works by leveraging an existing TCP session for a protocol like HTTP. As the network or firewall device already allowed the connection, this reuse of the connection is typically not detected.
Usage and audience
0trace is commonly used for bypassing firewall rules, bypassing security measures, or penetration testing. Target users for this tool are pentesters and security professionals.
- Command line interface
Supported operating systems
0trace is known to work on Linux.
Similar tools to 0trace:
FireAway is a security tool to test the security of a firewall by trying to bypass its rules. It will use different methods to hide data or avoid detection by the firewall itself. This tool can be used for both defensive as offensive security.
Opensvp is a security tool to test firewall software. It uses protocol level attacks to determine if the firewall is vulnerable to a type of attack.
Chiron is a security assessment framework for IPv6 testing. It can be used during penetration testing or analysis of network devices. Read how it works in this review.
This tool page was updated at . Found an improvement? Help the community by submitting an update.