14.2. Probing the Network

Now that Woolly has collected some general information about the target, it is time for him to begin probing and prodding to see what other systems or services might be available on the network. Woolly would do this even if he has already found his way inside the firewall through some other means, such as a contract job or dial-in access. Probing gives an attacker a road map of the network, as well as a list of available services.

14.2.1. The traceroute Command

You can use the traceroute command to trace the network path from one host to another. This is useful when you want to document the network segments between two hosts. An example of the output created by traceroute is shown in Figure 14.2.

NOTE

In the Windows ...

Get Mastering™ Network Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.