Common Linux Network Tools: traceroute and linuxtraceroute for Route Scanning
The previous two articles "common Linux Network Tools: fping host scanning" and "common Linux Network Tools: hping advanced host scanning" are about host scanning, this article describes traceroute and mtr, a common route scanning tool in Linux.
Route scanning mainly queries the number of Route hops from the local host to another host and the data delay.
Traceroute basic usage
The routing scanning tool is implemented
Source Management (Driver Management)Configure the ODBC driver and data source through the odbcconf.exe command linePackager.exe object packagePathping.exe contains Ping and tracert programsPentnt.exe checks floating point errors of PentiumPerfmon.exe System Performance MonitorPing.exe verify the connection to the remote computerPosix.exe for Unix compatibilityPrint.exe prints text files or displays the content of the print queue.Progman.exe Program
Date: 2011.9.29
Maintenance Personnel: Li yuanzhe, Technical Department
Fault description: The network connection is unstable, the network speed is slow, and Ping packet loss is serious.
System: win7 flagship
Tools/commands used: Windows cleanup assistant, doscommand (Ping, tracert, SFC)
Process: The group receives a temporary task. After hearing the fault description, it first considers the fault to be caused by aging of the network cable/route,
Settings \ Administrator> tracert 10.0.13.24
Tracing Route to localhost [10.0.13.24]
Over a maximum of 30 hops:
1 2 MS 1 MS 1 MS localhost [10.16.30.253]
2 9 MS 9 MS 10 MS localhost [10.3.20.33]
3 12 MS 9 MS 11 MS localhost [10.0.13.24]
Trace complete.
Access the Internet:
C: \ Documents ents and Settings \ Administrator> tracert www.163.com
Tracing Route to 163.xdwscache.glb0.lxdns.com [60.28.236.11
party is obtained, you can use the nbtstat command to obtain the other party's
Information, which increases the insurance coefficient of our intrusion.
Iii. netstat
This is a command used to view the network status, which is easy to operate and powerful.
-A: view all open ports on the local machine to effectively detect and prevent Trojans.
Service and other information, 4.
Here we can see that the local machine is open to FTP service, Telnet service, mail service, Web Service, and so on. Usage
Four Test Machines access the Internet through routers, and the routers access the Internet through dialing. After automatic dial-up, the IP address changes. You must go to the data center to view the public IP address of the router before you can connect remotely.
Initially, we plan to run the tracert www.sina.com.cn command on the machine behind the vro to find the IP address of the vro and then automatically send an email to relevant personnel. How
the same, otherwise it is a pity to miss it:
C:/> tracert 21.15.8.69
Tracing Route to 21.15.8.69 over a maximum of 30 hops
1
2 81 MS 90 MS 110 MS 218.17.0.1
3 60 MS 50 MS 60 MS 61.144.238.97
4 60 MS 90 MS 50 MS 61.144.236.161
5 60 MS 91 MS 90 MS 61.144.236.13
6 90 MS 80 MS 50 MS 61.140.1.21
7 80 MS 70 MS 50 MS POS2-0-R2-C-GZ-A.gd.cn.net [202.105.1.161]
8 60 MS 70 MS 60 MS 61.140.0.17
9 140 MS 120 MS 131 MS 202.97.34.105
10 91 MS 150 MS 120 MS 202.96
also gives us a chance to view the route from the host to the target host. This is because, when the ICMP ping request datagram passes through a vro, The vro will put its own IP address in the report. The target host will copy the IP address list to the host in response to the ICMP packet. However, in any case, the list of routes that the IP header can record is very limited. To observe routing, we still need to use a better tool, that is, traceroute (trace
Today, I saw a lot of Baidu IP addresses. In fact, many of them are disguised. How can we identify it!
I found a method. Share it with you.
Run cmd
Type the tracert spider IP address.
For example
Tracert 123.125.66.123
The red frame is the Baidu spider, and the rest are disguised.
There is also a way to reverse query through DNS
Click "start"-"run"-"cmd"-"Enter NSLookup IP Address"-"enter"
For ex
nbtstat command to further obtain the information of the other party, which increases the insurance coefficient of our intrusion.
Iii. netstat
This is a command used to view the network status, which is easy to operate and powerful.
-A: You can view all open ports on the local machine to effectively detect and prevent Trojans and know the services opened by the machine.
Here we can see that the local machine is open to FTP service, Telnet service, mail service, WEB Service, and so on. Usage: n
ISA Server troubleshooting Policy
10.2 ISA Server troubleshooting Policy
System methods are essential for successful troubleshooting. In the event of an unexpected ISA Server error, You Can troubleshoot the error based on the user or the data packet. This section provides troubleshooting policies for two types of connection problems.
ObjectiveEliminate user-based access issues.
Eliminate packet-based access issues.
Resolves VPN connection faults in ISA Server.
Estimated learning time: 30 minute
view current routing conditions.Basic usage:route [Print] [add] [change] [delete]Print : The main printing is the current routing situation.Add : manually adding routes or routing with the following example:
route ADD 157.0.0.0 MASK 255.0.0.0 157.55.80.1 METRIC 3 IF 2destination^ (目标地址) ^mask ^gateway metric^ ^Interface^ (接口)
Change : only used to modify the gateway and/or metric. Examples are as follows:
route CHANGE 157.0.0.0 MASK 255.0.0.0 157.55.80
firewall and has blocked the ICMP response.PING-T: Sending packets continuously. Of course, they are small, and they cannot be called attacks. Some people write their ownA program that resembles a ping command that sends a large packet of packets to block the target hostNetwork connection.2 NetThe recommendation is to use NET/? To obtain specific help information. There are a lot of parameters, the parameters below are alsoNumber. Commonly used: NET view \ \ Hosts look at sharing, net Start/sto
Suppose the host IP that you want to attack is: 61.139.1.79 The host IP that we have permission under the same subnet is: 61.139.1.88 and can be 3389 login First step: tracert 61.139.1.1c:\win2000\ System32>tracert 61.139.1.1tracing route to Hack-4fj7earc [61.139.1.1]over a maximum of hops: 1 N Bsp C-Segment penetration attack must see technical knowledge
CCNA Experiment 19 static and default routesEnvironment: Windows XP , Packet Tracert 5.3Purpose: To understand the use of static routes and default routesDescriptionstatic routing refers to routing information that is manually configured by the network administrator. When the topology of the network or the state of the link changes, it is necessary to manually modify the relevant static routing information in the router. Static routing information is
TTL expired in transit
This morning, something strange happened. The other party cannot remotely connect to the local host. Both parties connect to the Internet through ADSL, and the network status is normal. Run the ping command. The test result is as follows:
C: \ Ping 58.33.46.92
Pinging [58.33.46.92] with 32 bytes of data:
Reply from 61.152.81.25: TTL expired in transit.
Ping statistics for 58.33.46.92:
Packets: Sent = 4, stored ED = 4, lost = 0 (0% loss ),
Approximate round tr
Himself
As a network operations engineer, has been fascinated by scripting language since he contacted Linux. From the Shell to Java to the expect to python, slowly become accustomed to writing operations tools to solve the daily operations and maintenance problems.This write operation tools let me get to a lot of new skills, I feel it is necessary to put thoughts, process detailed records, so that later review review. The tool is actually a Python program used to detect routes on Windows.
and Design6.2.2 design the mail sending and receiving process6.2.3 Interface Design6.2.4 compile the business logic of the Main Window6.2.5 compile the mail sending business logic6.2.6 compile the business logic for receiving emails6.2.7 use multiple threads to send and receive emails6.3 demo of Running Effect6.4 summary of this ChapterChapter 2 FTP download and file transfer7.1 FTP protocol Overview7.1.1 procedure for downloading files using FTP7.1.2 description of related Class Libraries7.2 F
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.