From the course: Ethical Hacking: Footprinting and Reconnaissance (2016)
Unlock the full course today
Join today to access over 22,400 courses taught by industry experts or purchase this course individually.
Using Ping and Tracert - Linux Tutorial
From the course: Ethical Hacking: Footprinting and Reconnaissance (2016)
Using Ping and Tracert
- [Instructor] When conducting ethical hacking, we'll see that behind the scenes, the protocol ICMP is used because it's a very chatty protocol. We're going to take a look at Ping and Tracert and we're going to take a look at one more utility called PathPing to see what kind of information it gives us just by using that utility. So we are familiar with Ping. Ping is essentially utility used to test for reachability using the protocol ICMP or Internet Control Message Protocol. It just wants to see if it can reach it, if it's talking back to us and it's a very simple protocol. We put in Ping and in Windows operating system, it does it four times and stops. But what about Tracert or traceroute in Linux? Tracert in Windows, it's a command line tool that traces the route packet across the Internet and provides route path and transit times. How does it work? Well, it uses specially crafted ICMP packets which purposely time out, meaning the time to live value in the Internet header times out…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.