0trace

root@kali:~# 0trace.sh 
Usage: /usr/bin/0trace.sh iface target_ip [ target_port ]
root@kali:~# 0trace.sh wlan0 www.baidu.com 80
0trace v0.01 PoC by <lcamtuf@coredump.cx>
[+] Waiting for traffic from target on wlan0...
[+] Traffic acquired, waiting for a gap...
[+] Target acquired: 192.168.168.104:38738 -> 119.75.217.109:80 (588002313/2591709648).
[+] Setting up a sniffer...
[+] Sending probes...

TRACE RESULTS
-------------
1 192.168.168.1
2 14.131.224.1
3 218.241.252.181
4 14.197.245.41
6 192.168.0.54
7 192.168.0.57
8 10.34.240.22
Target reached.


root@kali:~# telnet www.baidu.com 80
Trying 119.75.217.109...
Connected to www.a.shifen.com.
Escape character is '^]'.
GET HTTP/1.1

 

posted @ 2015-09-20 10:07  NoH4cker  阅读(763)  评论(0编辑  收藏  举报