Dark Mode

Settings

Capec-293 Detail

Traceroute Route Enumeration

Detailed Software Typical Severity: Low

Parents: 309

Threats: T60 T65 T80 T258 T288 T291 T302 T334 T392 T407

Description

An adversary uses a traceroute utility to map out the route which data flows through the network in route to a target destination. Tracerouting can allow the adversary to construct a working topology of systems and routers by listing the systems through which data passes through on their way to the targeted machine. This attack can return varied results depending upon the type of traceroute that is performed. Traceroute works by sending packets to a target while incrementing the Time-to-Live field in the packet header. As the packet traverses each hop along its way to the destination, its TTL expires generating an ICMP diagnostic message that identifies where the packet expired. Traditional techniques for tracerouting involved the use of ICMP and UDP, but as more firewalls began to filter ingress ICMP, methods of traceroute using TCP were developed.

Not present

External ID Source Link Description
CAPEC-293 capec https://capec.mitre.org/data/definitions/293.html
CWE-200 cwe http://cwe.mitre.org/data/definitions/200.html
REF-33 reference_from_CAPEC Stuart McClure, Joel Scambray, George Kurtz, Hacking Exposed: Network Security Secrets & Solutions (6th Edition), 2009, McGraw Hill

Not present

  1. A network capable of routing the attackers' packets to the destination network.
  1. A command line version of traceroute or similar tool that performs route enumeration.

Not present

Confidentiality
Other

Not present