大家好,欢迎来到IT知识分享网。
tracetcp是WIN32的命令行traceroute实用程序,它使用TCP SYN数据包而不是通常的实现使用的ICMP / UDP数据包,从而绕过了阻止传统traceroute数据包的网关。
除了提供标准traceroute实用程序的功能外,tracetcp还允许在任何TCP端口上执行跟踪。这样可以发现防火墙阻止了哪些端口,以及是否存在已放置的任何透明代理。
资料下载
问题
发现任何问题都可以在这里提出。
也可以通过Twitter与我联系:
用法
单击此处以选择示例跟踪。
在命令提示符下:
tracetcp host [options]
where host = hostName|ipAddress[:portNumber|serviceName]
if portNumber or serviceName is not present then port 80 (http)
is assumed.
Options:
-? Displays help information.
-c Select condensed output mode
-h start_hop Starts trace at hop specified.
-m max_hops Maximum number of hops to reach target.
-n No reverse DNS lookups for each node.
-p num_pings # of pings per hop (default 3).
-r p1 p2 Multiple traces from port p1 to p2.
-t timeout Wait timeout milliseconds for each reply.
-v Displays version information.
-s p1 p2 Easy port scan mode. gives the same result as
setting the following options:
-cnr p1 p2 -h 128 -m 1 -p 1
-F Disables the Anti-flood timer. Normally tracetcp
waits *at least* 0.5 seconds between sending out
each packet, because if the packets are sent too
fast some host seem to detect this as some form of
flood and stop responding for a time. This option
disables the 0.5 second timer, so the traces occur
faster.
-R Use raw socket interface to send/receive packets
this will not work on XP sp2.
(you still need winpcap installed)
-g address use the specified host as a a gateway to remote
systems rather than the default gateway.
Examples:
tracetcp www.microsoft.com:80 -m 60
tracetcp post.sponge.com:smtp
tracetcp 192.168.0.1 -n -t 500
免责声明:本站所有文章内容,图片,视频等均是来源于用户投稿和互联网及文摘转载整编而成,不代表本站观点,不承担相关法律责任。其著作权各归其原作者或其出版社所有。如发现本站有涉嫌抄袭侵权/违法违规的内容,侵犯到您的权益,请在线联系站长,一经查实,本站将立刻删除。 本文来自网络,若有侵权,请联系删除,如若转载,请注明出处:https://yundeesoft.com/25447.html