From the course: Ethical Hacking: Footprinting and Reconnaissance (2016)

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

Using Ping and Tracert

Using Ping and Tracert - Linux Tutorial

From the course: Ethical Hacking: Footprinting and Reconnaissance (2016)

Start my 1-month free trial

Using Ping and Tracert

- [Instructor] When conducting ethical hacking, we'll see that behind the scenes, the protocol ICMP is used because it's a very chatty protocol. We're going to take a look at Ping and Tracert and we're going to take a look at one more utility called PathPing to see what kind of information it gives us just by using that utility. So we are familiar with Ping. Ping is essentially utility used to test for reachability using the protocol ICMP or Internet Control Message Protocol. It just wants to see if it can reach it, if it's talking back to us and it's a very simple protocol. We put in Ping and in Windows operating system, it does it four times and stops. But what about Tracert or traceroute in Linux? Tracert in Windows, it's a command line tool that traces the route packet across the Internet and provides route path and transit times. How does it work? Well, it uses specially crafted ICMP packets which purposely time out, meaning the time to live value in the Internet header times out…

Contents