<HTML>
 <HEAD>
 <TITLE>Tool 214: Traceroute discovery: graph of network topology</TITLE>
 </HEAD>
 <BODY BGCOLOR="#FFFFFF">
  <CENTER>   <H3>Tool 214: Traceroute discovery: graph of network topology</H3>
  </CENTER>

  <P><H3>Description:</H3>
   <PRE>
  This tool sends traceroute queries to a remote network, and creates
  a graph of remote computers. It traceroutes common TCP/UDP ports,
  and ICMP. Setting min-ttl and max-ttl correctly will speed up
  the scan.
  
  Parameter --spoofip indicates how to generate link layer for spoofing.
  Values 'best', 'link' or 'raw' are common choices for --spoofip. Here
  is the list of accepted values:
   - 'raw' means to spoof at IP4/IP6 level (it uses system IP stack). If
     a firewall is installed, or on some systems, this might not work.
   - 'linkf' means to spoof at link level (currently, only Ethernet is
     supported). The 'f' means to Fill source Ethernet address.
     However, if source IP address is spoofed, it might be impossible
     to Fill it. So, linkf will not work: use linkb or linkfb instead.
   - 'linkb' means to spoof at link level. The 'b' means to left a Blank
     source Ethernet address (0:0:0:0:0:0, do not try to Fill it).
   - 'linkfb' means to spoof at link level. The 'f' means to try to Fill
     source Ethernet address, but if it is not possible, it is left
     Blank.
   - 'rawlinkf' means to try 'raw', then try 'linkf'
   - 'rawlinkb' means to try 'raw', then try 'linkb'
   - 'rawlinkfb' means to try 'raw', then try 'linkfb'
   - 'linkfraw' means to try 'linkf', then try 'raw'
   - 'linkbraw' means to try 'linkb', then try 'raw'
   - 'linkfbraw' means to try 'linkfb', then try 'raw'
   - 'link' is an alias for 'linkfb'
   - 'rawlink' is an alias for 'rawlinkfb'
   - 'linkraw' is an alias for 'linkfbraw'
   - 'best' is an alias for 'linkraw'. It should work in all cases.
  
  This tool may need to be run with admin privilege in order to sniff
  and spoof.
   </PRE>

  <P><H3>Usage:</H3>
  &nbsp;&nbsp;netwox 214 -i ips [-p ports] [-P ports] [-c|+c] [-s spoofip] [-T uint32] [-t uint32] [-m uint32] [-r|+r] [-v|+v]<BR>

  <P><H3>Parameters:</H3>
<TABLE BORDER=1 CELLPADDING=4>
 <TR>
  <TD ALIGN=middle><I>parameter</I></TD>
  <TD ALIGN=middle><I>description</I></TD>
  <TD ALIGN=middle><I>example</I></TD>
 </TR>
 <TR><TD><TT>-i|--ips ips</TD>
<TD>list/range of IP addresses</TD>
<TD>all</TD></TR>
<TR><TD><TT>-p|--tcpports ports</TD>
<TD>list of open tcp ports to scan</TD>
<TD>21,22,23,25,53,79,80,88,110,113,119,139,143,389,443,445,1080,2401,6000</TD></TR>
<TR><TD><TT>-P|--udpports ports</TD>
<TD>list of closed udp ports to scan</TD>
<TD>1,53,67,68,123,137,138,161,162,177,514</TD></TR>
<TR><TD><TT>-c|--icmp|+c|--no-icmp</TD>
<TD>if icmp is also scanned</TD>
<TD><I>This boolean is set.<BR>Use + or --no- to unset it.</I></TD></TR>
<TR><TD><TT>-s|--spoofip spoofip</TD>
<TD>IP spoof initialization type</TD>
<TD>best</TD></TR>
<TR><TD><TT>-T|--min-ttl uint32</TD>
<TD>min ttl</TD>
<TD>1</TD></TR>
<TR><TD><TT>-t|--max-ttl uint32</TD>
<TD>max ttl</TD>
<TD>30</TD></TR>
<TR><TD><TT>-m|--max-ms uint32</TD>
<TD>max millisecond wait</TD>
<TD>1000</TD></TR>
<TR><TD><TT>-r|--resolve|+r|--no-resolve</TD>
<TD>resolve hostname</TD>
<TD>&nbsp;</TD></TR>
<TR><TD><TT>-v|--verbose|+v|--no-verbose</TD>
<TD>display intermediary results</TD>
<TD>&nbsp; </TD></TR>
</TABLE>

  <P><H3>Examples:</H3>
  &nbsp;&nbsp;netwox 214 -i "all"<BR>
<BR>
  &nbsp;&nbsp;netwox 214 --ips "all"<BR>
<BR>
 </BODY>
 </HTML>
