首页 > 其他 > 详细

0trace

时间:2015-09-20 10:29:21      阅读:375      评论:0      收藏:0      [点我收藏+]
root@kali:~# 0trace.sh 
Usage: /usr/bin/0trace.sh iface target_ip [ target_port ]
root@kali:~# 0trace.sh wlan0 www.baidu.com 80
0trace v0.01 PoC by <lcamtuf@coredump.cx>
[+] Waiting for traffic from target on wlan0...
[+] Traffic acquired, waiting for a gap...
[+] Target acquired: 192.168.168.104:38738 -> 119.75.217.109:80 (588002313/2591709648).
[+] Setting up a sniffer...
[+] Sending probes...

TRACE RESULTS
-------------
1 192.168.168.1
2 14.131.224.1
3 218.241.252.181
4 14.197.245.41
6 192.168.0.54
7 192.168.0.57
8 10.34.240.22
Target reached.


root@kali:~# telnet www.baidu.com 80
Trying 119.75.217.109...
Connected to www.a.shifen.com.
Escape character is ^].
GET HTTP 1.1

 

0trace

原文:http://www.cnblogs.com/NoH4cker/p/4822936.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!