This tool sends traceroute queries to a remote network, and creates a graph of remote computers. It traceroutes common TCP/UDP ports, and ICMP. Setting min-ttl and max-ttl correctly will speed up the scan. This tool also permits to use fake Ethernet and IP addresses. This tool may need to be run with admin privilege in order to sniff and spoof.
parameter | description | example |
-i|--ips ips | list/range of IP addresses | all |
-p|--tcpports ports | list of open tcp ports to scan | 21,22,23,25,53,79,80,88,110,113,119,139,143,389,443,445,1080,2401,6000 |
-P|--udpports ports | list of closed udp ports to scan | 1,53,67,68,123,137,138,161,162,177,514 |
-c|--icmp|+c|--no-icmp | if icmp is also scanned | This boolean is set. Use + or --no- to unset it. |
-d|--device device | spoof device | Eth0 |
-E|--src-eth eth | source ethernet address | 0:a:a:a:a:a |
-e|--dst-eth eth | destination ethernet address | 0:b:b:b:b:b |
-I|--src-ip ip | source IP address | 1.2.3.4 |
-T|--min-ttl uint32 | min ttl | 1 |
-t|--max-ttl uint32 | max ttl | 30 |
-m|--max-ms uint32 | max millisecond wait | 1000 |
-r|--resolve|+r|--no-resolve | resolve hostname | |
-v|--verbose|+v|--no-verbose | display intermediary results |