One of the important types of footprinting is network footprinting. Fortunately, there are several tools available which can be used for network footprinting to gain information about the target network. Using these tools, an information seeker can create a map of the targeted network. Using these tools, you can extract information such as: -
Network address ranges Hostnames Exposed hosts OS and application version information Patch state of the host and the applications Structure of the applications and back-end servers Tools for this purpose are listed below: -
Whois Ping Nslookup Tracert Traceroute Tracert options are available in all operating system as a command line feature. Visual traceroute, graphical and other GUI based traceroute applications are also available. Traceroute or Tracert command results in the path information from source to destination in the hop by hop manner. The result includes all hops in between source to destination. The result also includes latency between these hops.
Traceroute Analysis Consider an example, in which an attacker is trying to get network information by using tracert. After observing the following result, you can identify the network map.
10.0.0.1 is the first hop, which means it is the gateway. Tracert result of 184.108.40.206 shows, 220.127.116.11 is another interface of first hop device whereas connected IP includes 18.104.22.168 & 22.214.171.124.
192.168.0.254 is next to last hop 10.0.0.1. It can either connected to 126.96.36.199 or 188.8.131.52. To verify, trace next route.
192.168.0.254 is another interface of the network device, i.e. 184.108.40.206 connected next to 10.0.0.1. 192.168.0.1, 192.168.0.2 & 192.168.0.3 are connected directly to 192.168.0.254.
192.168.10.254 is another interface of the network device i.e. 220.127.116.11 connected next to 10.0.0.1. 192.168.10.1, 192.168.10.2 & 192.168.10.3 are connected directly to 192.168.10.254.
Traceroute Tools Traceroute tools are listed below: -
Path Analyzer Pro