0trace

0trace Cheat Sheet

Below is a cheat sheet for 0trace (GitHub), a tool used for tracing the route to a network service and discovering potential filtering devices along the path:

Basic Usage:

  1. Tracing to a Target:
   0trace <target>
  1. Specifying Destination Port:
   0trace -p <port> <target>
  1. Specifying Source Port:
   0trace -s <source_port> <target>

Options:

  1. -p – Specify Destination Port:
   0trace -p <port> <target>
  1. -s – Specify Source Port:
   0trace -s <source_port> <target>
  1. -i – Specify Interface:
   0trace -i <interface> <target>
  1. -d – Enable Debug Mode:
   0trace -d <target>

Examples:

  1. Tracing to a Target:
   0trace example.com
  1. Tracing to a Target on a Specific Port:
   0trace -p 80 example.com
  1. Tracing to a Target with a Specific Source Port:
   0trace -s 12345 example.com
  1. Tracing to a Target on a Specific Interface:
   0trace -i eth0 example.com
  1. Enable Debug Mode:
   0trace -d example.com

Output Interpretation:

  • Hop Type:
  • R: ICMP unreachable response (filtering device found)
  • T: TCP SYN/ACK response (reachable)
  • ?: Unknown response
  • Filtering Device Identification:
  • Look for R hops to identify potential filtering devices along the path.
  • Route Tracing:
  • Interpret the sequence of hops and response types to analyze the route to the target.

Note:

  • 0trace uses different types of packets to detect network filtering devices along the path.
  • Analyze the output carefully to identify potential filtering devices and understand the route to the target.
  • Requires root privileges or appropriate permissions to send raw packets.

Resources:

This cheat sheet provides an overview of basic 0trace usage and options for tracing routes to network services and identifying potential filtering devices along the path. Adjustments may be necessary based on specific network configurations and requirements. Always ensure compliance with security policies and legal regulations when performing network reconnaissance activities.