Difference between revisions of "HowTo Use The Scapy: Multi-Traceroute - MTR"

From NST Wiki
Jump to navigationJump to search
(Scapy: Multi-Traceroute (MTR) Reference Document)
(Overview)
Line 1: Line 1:
 
__TOC__
 
__TOC__
 
= Overview =
 
= Overview =
 +
[[File:Thunderbolt.png|frame|left|'''[[Feature Release Symbol | <center>NST 22<br /> SVN: 7683</center>]]''']]An NST 22 enhancement now includes a Multi-Taceroute visual using Scapy3k integrated into the  '''NST WUI'''.
  
 
== Simple Trace ==
 
== Simple Trace ==

Revision as of 08:32, 25 March 2016

Overview

An NST 22 enhancement now includes a Multi-Taceroute visual using Scapy3k integrated into the NST WUI.

Simple Trace

Using the Scapy Multi-Traceroute page can be as simple as entering the host name you want to perform the trace on (www.techhounds.com in the example below) and pressing the Run button.

ScapyMulitTraceRoute-simple.png

Once the trace completes you will get a graphical chart (as an SVG image shown below) that contains:

  • The list of IP addresses exposed by the trace (clicking on an IP address will bring up the IP tools widget).
  • Time measurements from the source to each segment of the trace.
  • ASN groupings (when possible) of each segment of the trace.

<img src="http://wiki.networksecuritytoolkit.org/nstwiki/images/Scapy-mtr-simple.svg" style="width: 800px" alt="A simple Scapy Multi-Traceroute Example" />

Complex Trace

<img src="http://wiki.networksecuritytoolkit.org/nstwiki/images/Mtr_overview.svg" style="width: 600px" alt="MTR Overview SVG Graphic" />

Scapy: Multi-Traceroute (MTR) Reference Document

Scapy: Multi-traceroute (MTR) Reference Document